PYSEC-2024-256

See a problem?
Import Source
https://github.com/pypa/advisory-database/blob/main/vulns/mobsf/PYSEC-2024-256.yaml
JSON Data
https://api.osv.dev/v1/vulns/PYSEC-2024-256
Aliases
Published
2024-12-03T16:15:24Z
Modified
2025-06-27T18:14:49.203947Z
Summary
[none]
Details

Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. In versions prior to 3.9.7, the requests.get() request in the checkurl method is specified as allow_redirects=True, which allows a server-side request forgery when a request to .well-known/assetlinks.json" returns a 302 redirect. This is a bypass of the fix for CVE-2024-29190 and is fixed in 3.9.7.

References

Affected packages

PyPI / mobsf

Package

Affected ranges

Type
GIT
Repo
https://github.com/mobsf/mobile-security-framework-mobsf
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.9.7

Affected versions

3.*

3.2.6
3.2.7
3.2.8
3.2.9
3.3.3
3.3.5
3.4.0
3.4.3
3.4.6
3.5.0
3.6.0
3.6.9
3.7.6