CVE-2025-46730: CWE-409: Improper Handling of Highly Compressed Data (Data Amplification) in MobSF Mobile-Security-Framework-MobSF
MobSF is a mobile application security testing tool used. Typically, MobSF is deployed on centralized internal or cloud-based servers that also host other security tools and web applications. Access to the MobSF web interface is often granted to internal security teams, audit teams, and external vendors. MobSF provides a feature that allows users to upload ZIP files for static analysis. Upon upload, these ZIP files are automatically extracted and stored within the MobSF directory. However, in versions up to and including 4.3.2, this functionality lacks a check on the total uncompressed size of the ZIP file, making it vulnerable to a ZIP of Death (zip bomb) attack. Due to the absence of safeguards against oversized extractions, an attacker can craft a specially prepared ZIP file that is small in compressed form but expands to a massive size upon extraction. Exploiting this, an attacker can exhaust the server's disk space, leading to a complete denial of service (DoS) not just for MobSF, but also for any other applications or websites hosted on the same server. This vulnerability can lead to complete server disruption in an organization which can affect other internal portals and tools too (which are hosted on the same server). If some organization has created their customized cloud based mobile security tool using MobSF core then an attacker can exploit this vulnerability to crash their servers. Commit 6987a946485a795f4fd38cebdb4860b368a1995d fixes this issue. As an additional mitigation, it is recommended to implement a safeguard that checks the total uncompressed size of any uploaded ZIP file before extraction. If the estimated uncompressed size exceeds a safe threshold (e.g., 100 MB), MobSF should reject the file and notify the user.
AI Analysis
Technical Summary
CVE-2025-46730 is a vulnerability in the Mobile-Security-Framework-MobSF, a widely used mobile application security testing tool. MobSF allows users to upload ZIP files for static analysis, which are then automatically extracted and stored on the server. Versions up to and including 4.3.2 do not impose any limits on the total uncompressed size of uploaded ZIP files. This flaw enables a ZIP of Death (zip bomb) attack, where an attacker crafts a maliciously compressed ZIP archive that is small in size but expands to an extremely large size upon extraction. Exploiting this vulnerability can exhaust the server's disk space, resulting in a denial of service (DoS) condition. Since MobSF is often deployed on centralized internal or cloud-based servers that host multiple security tools and web applications, the impact extends beyond MobSF itself, potentially disrupting other critical internal portals and services hosted on the same infrastructure. The vulnerability requires an attacker with at least some level of authenticated access (as indicated by the CVSS vector PR:H) but does not require user interaction. The vulnerability affects confidentiality and integrity minimally but severely impacts availability by causing server resource exhaustion. The issue has been addressed in a commit (6987a946485a795f4fd38cebdb4860b368a1995d) that implements checks on the uncompressed size of ZIP files before extraction. A recommended mitigation is to reject ZIP files whose estimated uncompressed size exceeds a safe threshold (e.g., 100 MB), preventing resource exhaustion. No known exploits are reported in the wild as of now.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability of internal security infrastructure and related services. Many enterprises and security teams rely on MobSF for mobile application security assessments, often deploying it on shared servers or cloud environments alongside other critical tools. An attacker exploiting this vulnerability could cause widespread disruption by exhausting disk space, leading to denial of service not only for MobSF but also for other applications hosted on the same server. This could delay security testing, audits, and incident response activities, potentially increasing the window of exposure to other threats. Organizations with customized or cloud-based deployments of MobSF are particularly vulnerable, as the attack could cause costly downtime and operational disruptions. Given the medium CVSS score (6.8) and the requirement for some level of authentication, the threat is moderate but should not be underestimated, especially in environments where multiple teams and external vendors have upload access. The lack of confidentiality or integrity impact reduces the risk of data breach but does not diminish the operational impact of service outages.
Mitigation Recommendations
1. Upgrade MobSF to a version later than 4.3.2 where the vulnerability is patched. 2. Implement strict validation on uploaded ZIP files by checking the total uncompressed size before extraction, rejecting files exceeding a predefined safe threshold (e.g., 100 MB). 3. Restrict upload permissions to trusted users only and enforce strong authentication and access controls to limit the attack surface. 4. Deploy MobSF on isolated servers or containers to prevent collateral damage to other critical applications in case of exploitation. 5. Monitor disk usage and set alerts for unusual spikes in storage consumption to detect potential zip bomb attacks early. 6. Consider implementing rate limiting or file size quotas on uploads to further reduce risk. 7. Regularly audit and review server logs for suspicious upload activity. 8. Educate internal and external users about the risks of uploading untrusted archives.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy, Spain
CVE-2025-46730: CWE-409: Improper Handling of Highly Compressed Data (Data Amplification) in MobSF Mobile-Security-Framework-MobSF
Description
MobSF is a mobile application security testing tool used. Typically, MobSF is deployed on centralized internal or cloud-based servers that also host other security tools and web applications. Access to the MobSF web interface is often granted to internal security teams, audit teams, and external vendors. MobSF provides a feature that allows users to upload ZIP files for static analysis. Upon upload, these ZIP files are automatically extracted and stored within the MobSF directory. However, in versions up to and including 4.3.2, this functionality lacks a check on the total uncompressed size of the ZIP file, making it vulnerable to a ZIP of Death (zip bomb) attack. Due to the absence of safeguards against oversized extractions, an attacker can craft a specially prepared ZIP file that is small in compressed form but expands to a massive size upon extraction. Exploiting this, an attacker can exhaust the server's disk space, leading to a complete denial of service (DoS) not just for MobSF, but also for any other applications or websites hosted on the same server. This vulnerability can lead to complete server disruption in an organization which can affect other internal portals and tools too (which are hosted on the same server). If some organization has created their customized cloud based mobile security tool using MobSF core then an attacker can exploit this vulnerability to crash their servers. Commit 6987a946485a795f4fd38cebdb4860b368a1995d fixes this issue. As an additional mitigation, it is recommended to implement a safeguard that checks the total uncompressed size of any uploaded ZIP file before extraction. If the estimated uncompressed size exceeds a safe threshold (e.g., 100 MB), MobSF should reject the file and notify the user.
AI-Powered Analysis
Technical Analysis
CVE-2025-46730 is a vulnerability in the Mobile-Security-Framework-MobSF, a widely used mobile application security testing tool. MobSF allows users to upload ZIP files for static analysis, which are then automatically extracted and stored on the server. Versions up to and including 4.3.2 do not impose any limits on the total uncompressed size of uploaded ZIP files. This flaw enables a ZIP of Death (zip bomb) attack, where an attacker crafts a maliciously compressed ZIP archive that is small in size but expands to an extremely large size upon extraction. Exploiting this vulnerability can exhaust the server's disk space, resulting in a denial of service (DoS) condition. Since MobSF is often deployed on centralized internal or cloud-based servers that host multiple security tools and web applications, the impact extends beyond MobSF itself, potentially disrupting other critical internal portals and services hosted on the same infrastructure. The vulnerability requires an attacker with at least some level of authenticated access (as indicated by the CVSS vector PR:H) but does not require user interaction. The vulnerability affects confidentiality and integrity minimally but severely impacts availability by causing server resource exhaustion. The issue has been addressed in a commit (6987a946485a795f4fd38cebdb4860b368a1995d) that implements checks on the uncompressed size of ZIP files before extraction. A recommended mitigation is to reject ZIP files whose estimated uncompressed size exceeds a safe threshold (e.g., 100 MB), preventing resource exhaustion. No known exploits are reported in the wild as of now.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability of internal security infrastructure and related services. Many enterprises and security teams rely on MobSF for mobile application security assessments, often deploying it on shared servers or cloud environments alongside other critical tools. An attacker exploiting this vulnerability could cause widespread disruption by exhausting disk space, leading to denial of service not only for MobSF but also for other applications hosted on the same server. This could delay security testing, audits, and incident response activities, potentially increasing the window of exposure to other threats. Organizations with customized or cloud-based deployments of MobSF are particularly vulnerable, as the attack could cause costly downtime and operational disruptions. Given the medium CVSS score (6.8) and the requirement for some level of authentication, the threat is moderate but should not be underestimated, especially in environments where multiple teams and external vendors have upload access. The lack of confidentiality or integrity impact reduces the risk of data breach but does not diminish the operational impact of service outages.
Mitigation Recommendations
1. Upgrade MobSF to a version later than 4.3.2 where the vulnerability is patched. 2. Implement strict validation on uploaded ZIP files by checking the total uncompressed size before extraction, rejecting files exceeding a predefined safe threshold (e.g., 100 MB). 3. Restrict upload permissions to trusted users only and enforce strong authentication and access controls to limit the attack surface. 4. Deploy MobSF on isolated servers or containers to prevent collateral damage to other critical applications in case of exploitation. 5. Monitor disk usage and set alerts for unusual spikes in storage consumption to detect potential zip bomb attacks early. 6. Consider implementing rate limiting or file size quotas on uploads to further reduce risk. 7. Regularly audit and review server logs for suspicious upload activity. 8. Educate internal and external users about the risks of uploading untrusted archives.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-04-28T20:56:09.084Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981dc4522896dcbdadcd
Added to database: 5/21/2025, 9:08:45 AM
Last enriched: 7/6/2025, 8:11:08 PM
Last updated: 7/26/2025, 9:00:58 PM
Views: 16
Related Threats
CVE-2025-8285: CWE-862: Missing Authorization in Mattermost Mattermost Confluence Plugin
MediumCVE-2025-54525: CWE-1287: Improper Validation of Specified Type of Input in Mattermost Mattermost Confluence Plugin
HighCVE-2025-54478: CWE-306: Missing Authentication for Critical Function in Mattermost Mattermost Confluence Plugin
HighCVE-2025-54463: CWE-754: Improper Check for Unusual or Exceptional Conditions in Mattermost Mattermost Confluence Plugin
MediumCVE-2025-54458: CWE-862: Missing Authorization in Mattermost Mattermost Confluence Plugin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.