Enviar #789765: atototo api-lab-mcp 0.2.1 Server-Side Request Forgeryinformación

Títuloatototo api-lab-mcp 0.2.1 Server-Side Request Forgery
DescripciónA server-side request forgery (SSRF) vulnerability (CWE-918) has been identified in api-lab-mcp, specifically within the MCP tools analyze_api_spec, generate_test_scenarios, and test_http_endpoint. An attacker with network access to the MCP/HTTP interface can supply maliciously crafted input through the source or url arguments, which flow unsanitized into outbound HTTP requests via fetch or axios. This allows the server to make arbitrary requests to internal services, cloud metadata endpoints, or other restricted destinations, potentially leading to unauthorized information disclosure and further compromise. Versions up to and including 0.2.1 are confirmed affected.
Fuente⚠️ https://github.com/atototo/api-lab-mcp/issues/4
Usuario
 BruceJin (UID 96538)
Sumisión2026-03-26 06:53 (hace 20 días)
Moderación2026-04-08 19:10 (13 days later)
EstadoAceptado
Entrada de VulDB356288 [atototo api-lab-mcp hasta 0.2.1 HTTP Interface src/mcp/http-server.ts source/url escalada de privilegios]
Puntos20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!