| عنوان | eghuzefa engineer-your-data 0.1.3 Path Traversal |
|---|
| الوصف | The project documents `WORKSPACE_PATH` as the directory that should contain the user's data workspace. However, the actual file tools (`read_file`, `write_file`, `list_files`, and `file_info`) do not enforce that boundary. They accept arbitrary paths from the caller, convert them directly to `Path(...)`, and operate on them immediately. This lets an attacker read or write files anywhere accessible to the service account, not just under the configured workspace. |
|---|
| المصدر | ⚠️ https://github.com/eghuzefa/engineer-your-data-mcp/issues/1 |
|---|
| المستخدم | SmallW (UID 97245) |
|---|
| ارسال | 10/04/2026 03:06 PM (18 أيام منذ) |
|---|
| الاعتدال | 27/04/2026 05:10 PM (17 days later) |
|---|
| الحالة | تمت الموافقة |
|---|
| إدخال VulDB | 359814 [eghuzefa engineer-your-data حتى 0.1.3 src/server.py read_file/write_file/list_files/file_inf WORKSPACE_PATH اجتياز الدليل] |
|---|
| النقاط | 20 |
|---|