MobSF has Stored XSS via Manifest Analysis - Dialer Code Hos... #1866
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Overview
This advisory documents a Stored Cross-Site Scripting (Stored XSS) in MobSF (Mobile Security Framework) during Android manifest analysis. It affects pip package
mobsfversions < 4.4.5 and is fixed in 4.4.5. Identifiers: CVE-2026-24490 / GHSA-8hf7-h89p-3pqj. Severity is High, with CVSS v3.1: 8.1 and vector CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N. Weakness: CWE-79 (XSS).### How the feature works (manifest analysis → find...
🔧 Technical Details
Stored XSS via “report generation pipeline”: if an application (1) parses a user-supplied artifact (e.g., APK), (2) extracts attacker-controlled fields (e.g.,
AndroidManifest.xmlattributes), (3) interpolates them into HTML-facing strings (e.g., Python%formatting into atitlefield), and (4) renders them with an explicit “no-escape” sink (e.g., Django template|safe), then an attacker can persist an HTML/JS payload that executes whenever any user opens the generated report. A practical technique is placing an entity-encoded HTML tag inside an XML attribute (e.g.,<img src=x onerror=...>) so it becomes active markup once the application disables output escaping.🤖 Agent Actions
Summary:
Tests:
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.