Soumettre #620530: agno-agi agno v1.7.5 OS Command Injectioninformation

Titreagno-agi agno v1.7.5 OS Command Injection
DescriptionA critical Remote Code Execution (RCE) vulnerability exists in the Agno framework's MCP (Model Context Protocol) integration. The vulnerability allows arbitrary command execution through insufficient input validation in the `MCPTools` and `MultiMCPTools` classes. When user-controlled input is passed to the `command` parameter, it is directly processed by `shlex.split()` and passed to `StdioServerParameters` without any sanitization or validation, enabling attackers to execute arbitrary system commands with the privileges of the Agno agent process.
La source⚠️ https://github.com/bayuncao-bit/vul-30
Utilisateur
 bayuncao (UID 50143)
Soumission22/07/2025 05:42 (il y a 9 mois)
Modérer06/08/2025 10:28 (15 days later)
StatutAccepté
Entrée VulDB319025 [agno-agi agno jusqu’à 1.7.5 Model Context Protocol mcp.py MCPTools/MultiMCPTools command élévation de privilèges]
Points20

Do you need the next level of professionalism?

Upgrade your account now!