VYPR
High severityNVD Advisory· Published Sep 21, 2023· Updated Sep 24, 2024

CVE-2023-42261

CVE-2023-42261

Description

Mobile Security Framework (MobSF) <=v3.7.8 Beta is vulnerable to Insecure Permissions. NOTE: the vendor's position is that authentication is intentionally not implemented because the product is not intended for an untrusted network environment. Use cases requiring authentication could, for example, use a reverse proxy server.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Mobile Security Framework (MobSF) ≤3.7.8 Beta has insecure permissions due to no authentication by design; intended for trusted networks only.

Vulnerability

Mobile Security Framework (MobSF) versions up to and including 3.7.8 Beta suffer from insecure permissions, as the application does not enforce any authentication mechanism. This design choice means that anyone who can reach the web interface has full access to all features without needing to log in [1]. The vendor explicitly states that authentication is intentionally not implemented because the product is not intended for untrusted network environments [1].

Exploitation

An attacker with network access to the MobSF instance (e.g., on the same local network or via exposed ports) can access the web UI and REST APIs without any credentials. No prior authentication or authorization is required to perform any action, including triggering static or dynamic analysis, uploading files, or viewing results [2][4]. The default Docker Compose configuration exposes port 8000 without any proxy, making the instance directly accessible if deployed as-is [4].

Impact

Successful exploitation grants an attacker complete control over the MobSF instance. They can submit mobile applications for analysis, view analysis reports, access sensitive data from scanned apps, and potentially modify configurations. This can lead to exposure of proprietary application code, credentials, or other confidential information processed by MobSF [1][2].

Mitigation

The vendor recommends deploying MobSF behind a reverse proxy that enforces authentication (e.g., HTTP Basic Auth, OAuth) when used in untrusted networks [1]. No software patch is provided as the vendor considers this behavior by design. Users are advised to follow secure deployment practices and never expose MobSF directly to untrusted networks.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
mobsfPyPI
< 3.9.73.9.7

Affected products

2
  • Mobile Security Framework/Mobile Security Frameworkdescription
  • ghsa-coords
    Range: < 3.9.7

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.