Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework. According to Apple's documentation for bundle ID's, it must contain only alphanumeric characters (A–Z, a–z, and 0–9), hyphens (-), and periods (.). However, an attacker can manually modify this value in the `Info.plist` file and add special characters to the `<key>CFBundleIdentifier</key>` value. When the application parses the wrong characters in the bundle ID, it encounters an error. As a result, it will not display content and will throw a 500 error instead. The only way to make the pages work again is to manually remove the malicious application from the system. This issue has been addressed in version 4.3.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Configurations
History
23 May 2025, 17:18
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other | |
Summary |
|
|
First Time |
Opensecurity
Opensecurity mobile Security Framework |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
CPE | cpe:2.3:a:opensecurity:mobile_security_framework:*:*:*:*:*:*:*:* | |
References | () https://developer.apple.com/documentation/bundleresources/information-property-list/cfbundleidentifier - Technical Description | |
References | () https://github.com/MobSF/Mobile-Security-Framework-MobSF/commit/05206e72cae35b311615a70e51e1a946955c5e83 - Patch | |
References | () https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-jrm8-xgf3-fwqr - Exploit, Vendor Advisory |
05 Feb 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-05 19:15
Updated : 2025-05-23 17:18
NVD link : CVE-2025-24804
Mitre link : CVE-2025-24804
CVE.ORG link : CVE-2025-24804
JSON object : View
Products Affected
opensecurity
- mobile_security_framework
CWE