Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. In versions prior to 3.9.7, the requests.get() request in the _check_url method is specified as allow_redirects=True, which allows a server-side request forgery when a request to .well-known/assetlinks.json" returns a 302 redirect. This is a bypass of the fix for CVE-2024-29190 and is fixed in 3.9.7.
                
            References
                    Configurations
                    History
                    27 Jun 2025, 15:17
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/MobSF/Mobile-Security-Framework-MobSF/commit/f22c584aa7d43527970c9da61eb678953cfc0a8e - Patch | |
| References | () https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-m435-9v6r-v5f6 - Vendor Advisory | |
| CPE | cpe:2.3:a:opensecurity:mobile_security_framework:*:*:*:*:*:*:*:* | |
| First Time | Opensecurity Opensecurity mobile Security Framework | |
| Summary | 
 | 
03 Dec 2024, 16:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-12-03 16:15
Updated : 2025-06-27 15:17
NVD link : CVE-2024-54000
Mitre link : CVE-2024-54000
CVE.ORG link : CVE-2024-54000
JSON object : View
Products Affected
                opensecurity
- mobile_security_framework
CWE
                
                    
                        
                        CWE-918
                        
            Server-Side Request Forgery (SSRF)
