Enviar #795355: chatboxai chatbox 1.20.0 Arbitrary Command Executioninformación

Títulochatboxai chatbox 1.20.0 Arbitrary Command Execution
DescripciónChatbox v1.20.0 contains an arbitrary command execution vulnerability in the MCP (Model Context Protocol) stdio transport IPC handler. The mcp:stdio-transport:create IPC channel accepts command, args, and env parameters directly from the renderer process and spawns a child process via StdioClientTransport without any validation, sanitization, or command allowlisting. Since ipcRenderer.invoke is directly exposed via the Electron context bridge (see chatbox_02), any JavaScript running in the renderer context can execute arbitrary system commands with the full privileges of the Electron main process.
Fuente⚠️ https://github.com/chatboxai/chatbox/issues/3627
Usuario
 Yu_Bao (UID 89348)
Sumisión2026-04-02 11:03 (hace 15 días)
Moderación2026-04-12 06:30 (10 days later)
EstadoAceptado
Entrada de VulDB356993 [chatboxai chatbox hasta 1.20.0 Model Context Protocol Server Management System ipc-stdio-transport.ts StdioClientTransport args/env escalada de privilegios]
Puntos20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!