Description
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework. According to Apple's documentation for bundle ID's, it must contain only alphanumeric characters (A–Z, a–z, and 0–9), hyphens (-), and periods (.). However, an attacker can manually modify this value in the `Info.plist` file and add special characters to the `<key>CFBundleIdentifier</key>` value. The `dynamic_analysis.html` file does not sanitize the received bundle value from Corellium and as a result, it is possible to break the HTML context and achieve Stored XSS. This issue has been addressed in version 4.3.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
INFO
Published Date :
2025-02-05T18:41:30.040Z
Last Modified :
2025-02-12T19:41:05.505Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2025-24803 vulnerability.
| Vendors | Products |
|---|---|
| Opensecurity |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-24803.