CVE-2022-41547
Description
Mobile Security Framework (MobSF) v0.9.2 and below was discovered to contain a local file inclusion (LFI) vulnerability in the StaticAnalyzer/views.py script. This vulnerability allows attackers to read arbitrary files via a crafted HTTP request.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
MobSF v0.9.2 and below has an LFI in StaticAnalyzer/views.py allowing attackers to read arbitrary files via a crafted HTTP request.
Vulnerability
Analysis
Mobile Security Framework (MobSF) versions up to and including v0.9.2 contain a local file inclusion (LFI) vulnerability in the StaticAnalyzer/views.py script. The flaw resides in the ViewSource function, where the md5 parameter is insufficiently sanitized. An attacker can inject path traversal sequences, such as ../, combined with a null byte termination to bypass the intended file access restrictions [1][4].
Exploitation
The vulnerability can be exploited remotely without authentication. A crafted HTTP GET request to the /ViewSource/ endpoint with a malicious file and md5 parameter allows an attacker to read arbitrary files on the server filesystem. The PoC demonstrates reading /private/etc/passwd on macOS by using an actual MD5 hash at the head of the md5 value, followed by path traversal and a null byte (%00) to terminate the string [1][4].
Impact
Successful exploitation enables an attacker to read sensitive files from the MobSF server, including configuration files, application source code, or system files like /etc/passwd. This could lead to further compromise of the server or leaked credentials. The vulnerability does not require elevated privileges, making it a high-severity issue for any MobSF instance exposed to untrusted networks [2].
Mitigation
The vulnerability was fixed in commit b9cdd1f, which properly validates the md5 parameter and prevents directory traversal [1]. Users are strongly advised to upgrade to MobSF v0.9.3 or later. No official workaround is available for v0.9.2 or earlier versions [3].
- Security: Fix for LFI found by thongngo · MobSF/Mobile-Security-Framework-MobSF@b9cdd1f
- NVD - CVE-2022-41547
- GitHub - MobSF/Mobile-Security-Framework-MobSF: Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.
- [Security] Fix Local File Inclusion Vulnerability in ViewSource Function. Version <= v0.9.2 by thongngo · Pull Request #166 · MobSF/Mobile-Security-Framework-MobSF
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
mobsfPyPI | < 0.9.3 | 0.9.3 |
Affected products
2- Mobile Security Framework (MobSF)/Mobile Security Framework (MobSF)description
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.