The fix for the "SSRF Vulnerability on assetlinkscheck(actname, well_knowns)" vulnerability could potentially be bypassed.
Since the requests.get() request in the checkurl method is specified as allow_redirects=True, if "https://mydomain.com/.well-known/assetlinks.json" returns a 302 redirect, subsequent requests will be sent automatically. If the redirect location is "http://192.168.1.102/user/delete/1", a request will be sent here as well.
<img width="610" alt="image" src="https://github.com/MobSF/Mobile-Security-Framework-MobSF/assets/150332295/a8c9630e-3d12-441a-816c-8f5e427a5194">
It will be safer to use allow_redirects=False.
The attacker can cause the server to make a connection to internal-only services within the organization's infrastructure.
{ "nvd_published_at": "2024-12-03T16:15:24Z", "cwe_ids": [ "CWE-918" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2025-06-27T20:43:48Z" }