CWE
409
Advisory Published
Updated

GHSA-c5vg-26p8-q8cr

First published: Mon May 05 2025(Updated: )

**Vulnerable MobSF Versions:** <= v4.3.2 **Details:** MobSF is a widely adopted mobile application security testing tool used by security teams across numerous organizations. Typically, MobSF is deployed on centralized internal or cloud-based servers that also host other security tools and web applications. Access to the MobSF web interface is often granted to internal security teams, audit teams, and external vendors. MobSF provides a feature that allows users to upload ZIP files for static analysis. Upon upload, these ZIP files are automatically extracted and stored within the MobSF directory. However, this functionality lacks a check on the total uncompressed size of the ZIP file, making it vulnerable to a ZIP of Death (zip bomb) attack. Due to the absence of safeguards against oversized extractions, an attacker can craft a specially prepared ZIP file that is small in compressed form but expands to a massive size upon extraction. Exploiting this, an attacker can exhaust the server's disk space, leading to a complete denial of service (DoS) not just for MobSF, but also for any other applications or websites hosted on the same server. **Attack Scenario:** Suppose the server hosting MobSF has 5 GB of free disk space.. A malicious user will first create a genuine hello world application code using android studio and inside this code directory (app//src/main/java/APK_PATH/bomb.txt) he'll place a bomb.txt file. This bomb.txt file will have billions of zeros to increase the file size on storage and make it to 4.99 GB. Now suppose the resultant hello world code directory including original code and bomb.txt files will be of 5GB, so the attacker will compress the entire hello world code directory to zip and resultant zip will be around 12-15 MBs only. An attacker will upload this zip bomb using the MobSF web interface or API. So an attacker will spend only 12-15 MB of his bandwidth. Now the MobSF tool will extract that zip file and it'll be automatically converted into its original size 5GB. So now a web server will be forced to store 5GB of data and its storage will be exhausted by an attacker's single request. Web server's storage and resources will not be able to handle other running websites or applications as the storage is exhausted. This way an attacker can achieve complete Web Server Resource Exhaustion. **Impact:** 1. This vulnerability can lead to complete server disruption in an organization which can affect other internal portals and tools too (which are hosted on the same server). 2. If some organization has created their customised cloud based mobile security tool using MobSF core then an attacker can exploit this vulnerability to crash their servers. **POC:** 1. Screen Recording : https://drive.google.com/file/d/1x7GEPJr2T04Ij5ZFQQtGWvUWXtM4M4aw/view?usp=sharing 2. POC Zip Bomb File (Upon extraction this file will consume 6GB of storage) : https://drive.google.com/file/d/1N3apL1ySMecnt3HUQcDcuH7hsjPrdwUj/view?usp=sharing **Mitigation:** It is recommended to implement a safeguard that checks the total uncompressed size of any uploaded ZIP file before extraction. If the estimated uncompressed size exceeds a safe threshold (e.g., 100 MB), MobSF should reject the file and notify the user.

Affected SoftwareAffected VersionHow to fix
pip/mobsf<=4.3.2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of GHSA-c5vg-26p8-q8cr?

    The severity of GHSA-c5vg-26p8-q8cr is considered high due to vulnerabilities in MobSF versions less than or equal to v4.3.2.

  • How do I fix GHSA-c5vg-26p8-q8cr?

    To fix GHSA-c5vg-26p8-q8cr, upgrade MobSF to the latest version beyond v4.3.2.

  • What versions of MobSF are affected by GHSA-c5vg-26p8-q8cr?

    GHSA-c5vg-26p8-q8cr affects all versions of MobSF that are v4.3.2 or earlier.

  • What is MobSF and its relevance in GHSA-c5vg-26p8-q8cr?

    MobSF is a mobile application security testing tool widely used, and the GHSA-c5vg-26p8-q8cr advisory highlights critical vulnerabilities present in its older versions.

  • Are there any known exploits for GHSA-c5vg-26p8-q8cr?

    Yes, while specific exploits are not detailed, the vulnerabilities in GHSA-c5vg-26p8-q8cr could potentially lead to significant risks if not addressed.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203