Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. In versions prior to 3.9.7, the requests.get() request in the _check_url method is specified as allow_redirects=True, which allows a server-side request forgery when a request to .well-known/assetlinks.json" returns a 302 redirect. This is a bypass of the fix for CVE-2024-29190 and is fixed in 3.9.7.
References
Configurations
History
27 Jun 2025, 15:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/MobSF/Mobile-Security-Framework-MobSF/commit/f22c584aa7d43527970c9da61eb678953cfc0a8e - Patch | |
References | () https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-m435-9v6r-v5f6 - Vendor Advisory | |
Summary |
|
|
CPE | cpe:2.3:a:opensecurity:mobile_security_framework:*:*:*:*:*:*:*:* | |
First Time |
Opensecurity
Opensecurity mobile Security Framework |
03 Dec 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-12-03 16:15
Updated : 2025-06-27 15:17
NVD link : CVE-2024-54000
Mitre link : CVE-2024-54000
CVE.ORG link : CVE-2024-54000
JSON object : View
Products Affected
opensecurity
- mobile_security_framework
CWE
CWE-918
Server-Side Request Forgery (SSRF)