Soumettre #785034: imprvhub mcp-browser-agent 0.8.0 Server-Side Request Forgeryinformation

Titreimprvhub mcp-browser-agent 0.8.0 Server-Side Request Forgery
DescriptionThis proof of concept demonstrates a Server-Side Request Forgery (SSRF) vulnerability in the MCP browser agent. The vulnerability resides in the browser_navigate functionality, which allows an attacker to control the url parameter and navigate the browser to arbitrary destinations. By exploiting this flaw, an attacker can force the server to send requests to internal or external systems, potentially exposing sensitive information, accessing restricted resources, or delivering malicious content. This SSRF vulnerability could be leveraged to bypass network restrictions, scan internal networks, or exfiltrate data
La source⚠️ https://github.com/wing3e/public_exp/issues/25
Utilisateur
 feng kairui (UID 96539)
Soumission21/03/2026 11:22 (il y a 22 jours)
Modérer05/04/2026 16:03 (15 days later)
StatutAccepté
Entrée VulDB355398 [imprvhub mcp-browser-agent jusqu’à 0.8.0 URL Parameter src/handlers.ts CallToolRequestSchema request.params.name/request.params.arguments élévation de privilèges]
Points20

Might our Artificial Intelligence support you?

Check our Alexa App!