Enviar #798622: choieastsea simple-openstack-mcp 767b2f4a8154cca344344b9725537a58399e6036 OS Command Injectioninformación

Títulochoieastsea simple-openstack-mcp 767b2f4a8154cca344344b9725537a58399e6036 OS Command Injection
DescripciónThe exec_openstack MCP tool only checks that input starts with openstack, then passes the full string to subprocess.run(..., shell=True). An attacker can append shell metacharacters (for example ;) to execute arbitrary OS commands under the service account.
Fuente⚠️ https://github.com/choieastsea/simple-openstack-mcp/issues/3
Usuario
 MidA (UID 96794)
Sumisión2026-04-07 10:59 (hace 21 días)
Moderación2026-04-26 09:15 (19 days later)
EstadoAceptado
Entrada de VulDB359641 [choieastsea simple-openstack-mcp hasta 767b2f4a8154cca344344b9725537a58399e6036 server.py exec_openstack escalada de privilegios]
Puntos18

Do you know our Splunk app?

Download it now for free!