{"uuid": "5470ba95-a381-46e9-bbdd-1a0e4e5334a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43399", "type": "seen", "source": "https://t.me/cvedetector/3516", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43399 - \"MobSF Unvalidated .a Extension File Extraction\"\", \n  \"Content\": \"CVE ID : CVE-2024-43399 \nPublished : Aug. 19, 2024, 3:15 p.m. | 26\u00a0minutes ago \nDescription : Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. Before 4.0.7, there is a flaw in the Static Libraries analysis section. Specifically, during the extraction of .a extension files, the measure intended to prevent Zip Slip attacks is improperly implemented. Since the implemented measure can be bypassed, the vulnerability allows an attacker to extract files to any desired location within the server running MobSF. This vulnerability is fixed in 4.0.7. \nSeverity: 8.0 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-19T17:41:43.000000Z"}