إرسال #802086: eghuzefa engineer-your-data 0.1.3 Path Traversalالمعلومات

عنوانeghuzefa engineer-your-data 0.1.3 Path Traversal
الوصفThe project documents `WORKSPACE_PATH` as the directory that should contain the user's data workspace. However, the actual file tools (`read_file`, `write_file`, `list_files`, and `file_info`) do not enforce that boundary. They accept arbitrary paths from the caller, convert them directly to `Path(...)`, and operate on them immediately. This lets an attacker read or write files anywhere accessible to the service account, not just under the configured workspace.
المصدر⚠️ https://github.com/eghuzefa/engineer-your-data-mcp/issues/1
المستخدم SmallW (UID 97245)
ارسال10/04/2026 03:06 PM (18 أيام منذ)
الاعتدال27/04/2026 05:10 PM (17 days later)
الحالةتمت الموافقة
إدخال VulDB359814 [eghuzefa engineer-your-data حتى 0.1.3 src/server.py read_file/write_file/list_files/file_inf WORKSPACE_PATH اجتياز الدليل]
النقاط20