Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS00aGgzLXZqMzItZ3I2as4AA-xV
Mobile Security Framework (MobSF) has a Zip Slip Vulnerability in .a Static Library Files
Summary
Upon reviewing the MobSF source code, I identified a flaw in the Static Libraries analysis section. Specifically, during the extraction of .a extension files, the measure intended to prevent Zip Slip attacks is improperly implemented.
Since the implemented measure can be bypassed, the vulnerability allows an attacker to extract files to any desired location within the server running MobSF.
Details
Upon examining lines 183-192 of the mobsf/StaticAnalyzer/views/common/shared_func.py
file, it is observed that there is a mitigation against Zip Slip attacks implemented as a.decode('utf-8', 'ignore').replace('../', '').replace('..\\', '')
. However, this measure can be bypassed using sequences like ....//....//....//
. Since the replace operation is not recursive, this sequence is transformed into ../../../
after the replace operation, allowing files to be written to upper directories.
For the proof of concept, I created an .a archive file that renders MobSF unusable by writing an empty file with the same name over the database located at /home/mobsf/.MobSF/db.sqlite3
.
I am including the binary used for the POC named poc.VULN
. To test it, you need to rename this binary to poc.a
.
Warning: As soon as you scan this file with MobSF, the database will be deleted, rendering MobSF unusable.
PoC Binary File (poc.VULN)
PoC
https://github.com/user-attachments/assets/3225ccb0-cb00-47a5-8305-37a40ca1ae7f
Impact
When a malicious .a file is scanned with MobSF, a critical vulnerability is present as it allows files to be extracted to any location on the server where MobSF is running. In this POC, I deleted the database, but it is also possible to achieve RCE by overwriting binaries of certain tools or by overwriting the /etc/passwd file.
Permalink: https://github.com/advisories/GHSA-4hh3-vj32-gr6jJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS00aGgzLXZqMzItZ3I2as4AA-xV
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 3 months ago
Updated: 3 months ago
CVSS Score: 8.0
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Identifiers: GHSA-4hh3-vj32-gr6j, CVE-2024-43399
References:
- https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-4hh3-vj32-gr6j
- https://nvd.nist.gov/vuln/detail/CVE-2024-43399
- https://github.com/MobSF/Mobile-Security-Framework-MobSF/commit/cc625fe8430f3437a473e82aa2966d100a4dc883
- https://github.com/advisories/GHSA-4hh3-vj32-gr6j
Blast Radius: 0.0
Affected Packages
pypi:mobsf
Dependent packages: 0Dependent repositories: 1
Downloads: 1,240 last month
Affected Version Ranges: <= 4.0.6
Fixed in: 4.0.7
All affected versions: 3.2.6, 3.2.7, 3.2.8, 3.2.9, 3.3.3, 3.3.5, 3.4.0, 3.4.3, 3.4.6, 3.5.0, 3.6.0, 3.6.9, 3.7.6, 3.9.7
All unaffected versions: 4.1.3