| Título | agentuniverse-ai agentUniverse v0.0.18 OS Command Injection |
|---|
| Descripción | Critical Remote Code Execution (RCE) vulnerabilities exist in the AgentUniverse framework's MCP (Model Context Protocol) implementation. The vulnerabilities allow arbitrary command execution through insufficient input validation in multiple components including MCPSessionManager, MCPTool, and MCPToolkit. When establishing connections to MCP servers, user-controlled input is directly passed to `StdioServerParameters` and subsequently to `anyio.open_process()` without any sanitization or validation, enabling attackers to execute arbitrary system commands with the privileges of the AgentUniverse process. |
|---|
| Fuente | ⚠️ https://github.com/bayuncao-bit/vul-37 |
|---|
| Usuario | bayuncao (UID 50143) |
|---|
| Sumisión | 2025-07-23 09:14 (hace 9 meses) |
|---|
| Moderación | 2025-08-07 12:46 (15 days later) |
|---|
| Estado | Aceptado |
|---|
| Entrada de VulDB | 319127 [agentUniverse hasta 0.0.18 MCPSessionManager/MCPTool/MCPToolkit StdioServerParameters escalada de privilegios] |
|---|
| Puntos | 20 |
|---|