High severityNVD Advisory· Published Dec 3, 2024· Updated Dec 3, 2024
Mobile Security Framework (MobSF) bypass of SSRF fix
CVE-2024-54000
Description
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. In versions prior to 3.9.7, the requests.get() request in the _check_url method is specified as allow_redirects=True, which allows a server-side request forgery when a request to .well-known/assetlinks.json" returns a 302 redirect. This is a bypass of the fix for CVE-2024-29190 and is fixed in 3.9.7.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
mobsfPyPI | < 3.9.7 | 3.9.7 |
Affected products
1- Range: < 3.9.7
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-m435-9v6r-v5f6ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-54000ghsaADVISORY
- github.com/MobSF/Mobile-Security-Framework-MobSF/commit/f22c584aa7d43527970c9da61eb678953cfc0a8eghsax_refsource_MISCWEB
- github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-m435-9v6r-v5f6ghsax_refsource_CONFIRMWEB
- github.com/pypa/advisory-database/tree/main/vulns/mobsf/PYSEC-2024-256.yamlghsaWEB
News mentions
0No linked articles in our index yet.