Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m435-9v6r-v5f6

Опубликовано: 27 июн. 2025
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

MobSF vulnerability allows SSRF due to the allow_redirects=True parameter

Summary

The fix for the "SSRF Vulnerability on assetlinks_check(act_name, well_knowns)" vulnerability could potentially be bypassed.

Details

Since the requests.get() request in the _check_url method is specified as allow_redirects=True, if "https://mydomain.com/.well-known/assetlinks.json" returns a 302 redirect, subsequent requests will be sent automatically. If the redirect location is "http://192.168.1.102/user/delete/1", a request will be sent here as well.

image

It will be safer to use allow_redirects=False.

Impact

The attacker can cause the server to make a connection to internal-only services within the organization's infrastructure.

Пакеты

Наименование

mobsf

pip
Затронутые версииВерсия исправления

< 3.9.7

3.9.7

EPSS

Процентиль: 38%
0.00171
Низкий

7.5 High

CVSS3

Дефекты

CWE-918

Связанные уязвимости

CVSS3: 7.5
nvd
около 1 года назад

Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. In versions prior to 3.9.7, the requests.get() request in the _check_url method is specified as allow_redirects=True, which allows a server-side request forgery when a request to .well-known/assetlinks.json" returns a 302 redirect. This is a bypass of the fix for CVE-2024-29190 and is fixed in 3.9.7.

EPSS

Процентиль: 38%
0.00171
Низкий

7.5 High

CVSS3

Дефекты

CWE-918