Enviar #668005: wonderwhy-er DesktopCommanderMCP 0.2.13 OS Command Injectioninformación

Títulowonderwhy-er DesktopCommanderMCP 0.2.13 OS Command Injection
DescripciónCommand Blocklist Bypass via Absolute Path The command blocklist can be bypassed by specifying the absolute path to a blocked command. The extractBaseCommand function uses the entire string as the command name if it contains no spaces, failing to normalise paths to their base command name. For example, the check fails to match the blocked command sudo with the user input /usr/bin/sudo. This vulnerability allows a malicious actor to bypass the command blocklist by simply providing a full path to the command. This leads to arbitrary command execution, nullifying the security control. The severity would vary depending on the privileges of the user running the server.
Fuente⚠️ https://github.com/wonderwhy-er/DesktopCommanderMCP/issues/218
Usuario
 crem (UID 91252)
Sumisión2025-10-03 07:16 (hace 7 meses)
Moderación2025-10-08 12:53 (5 days later)
EstadoAceptado
Entrada de VulDB327609 [wonderwhy-er DesktopCommanderMCP hasta 0.2.13 Absolute Path src/command-manager.ts extractBaseCommand escalada de privilegios]
Puntos20

Might our Artificial Intelligence support you?

Check our Alexa App!