Soumettre #798622: choieastsea simple-openstack-mcp 767b2f4a8154cca344344b9725537a58399e6036 OS Command Injectioninformation

Titrechoieastsea simple-openstack-mcp 767b2f4a8154cca344344b9725537a58399e6036 OS Command Injection
DescriptionThe exec_openstack MCP tool only checks that input starts with openstack, then passes the full string to subprocess.run(..., shell=True). An attacker can append shell metacharacters (for example ;) to execute arbitrary OS commands under the service account.
La source⚠️ https://github.com/choieastsea/simple-openstack-mcp/issues/3
Utilisateur
 MidA (UID 96794)
Soumission07/04/2026 10:59 (il y a 21 jours)
Modérer26/04/2026 09:15 (19 days later)
StatutAccepté
Entrée VulDB359641 [choieastsea simple-openstack-mcp server.py exec_openstack élévation de privilèges]
Points18

Do you want to use VulDB in your project?

Use the official API to access entries easily!