Enviar #668006: wonderwhy-er DesktopCommanderMCP 0.2.13 Improper Neutralizationinformación

Títulowonderwhy-er DesktopCommanderMCP 0.2.13 Improper Neutralization
DescripciónCommand Blocklist Bypass Via Command Substitution The command validation logic in the CommandManager class class is vulnerable to a bypass when an attacker uses shell command substitution syntax, such as $(...) or backticks (`...`). The parser does not recognise or recursively validate commands nested within this syntax. This allows a blocked command (e.g., sudo) to be executed by embedding it within an allowed command (like echo). This vulnerability allows a malicious actor to completely bypass the command blocklist, leading to arbitrary command execution. A malicious prompt could bypass the blocklist and run any command. The severity would vary depending on the privileges of the user running the server.
Fuente⚠️ https://github.com/wonderwhy-er/DesktopCommanderMCP/issues/217
Usuario
 crem (UID 91252)
Sumisión2025-10-03 07:16 (hace 7 meses)
Moderación2025-10-08 12:53 (5 days later)
EstadoAceptado
Entrada de VulDB327610 [wonderwhy-er DesktopCommanderMCP hasta 0.2.13 src/command-manager.ts CommandManager escalada de privilegios]
Puntos20

Do you want to use VulDB in your project?

Use the official API to access entries easily!