| Titre | GitHub mcp-maigret v1.0.12 Command Injection |
|---|
| Description | The `username` parameter of the `search_username` tool provided by MCP is externally controllable. This tool uses the `child_process.exec` function, which allows users to execute arbitrary code.
I mentioned the vulnerability in issue https://github.com/BurtTheCoder/mcp-maigret/issues/9 , and the author fixed it at https://github.com/BurtTheCoder/mcp-maigret/commit/b1ae073c4b3e789ab8de36dc6ca8111ae9399e7a |
|---|
| La source | ⚠️ https://github.com/BurtTheCoder/mcp-maigret/commit/b1ae073c4b3e789ab8de36dc6ca8111ae9399e7a |
|---|
| Utilisateur | Lexpl0it (UID 89340) |
|---|
| Soumission | 27/01/2026 04:50 (il y a 3 mois) |
|---|
| Modérer | 06/02/2026 21:49 (11 days later) |
|---|
| Statut | Accepté |
|---|
| Entrée VulDB | 344765 [BurtTheCoder mcp-maigret jusqu’à 1.0.12 search_username src/index.ts Nom d'utilisateur élévation de privilèges] |
|---|
| Points | 20 |
|---|