| शीर्षक | Divyanshu-hash GitPilot-MCP 9ed9f153ba4158a2ad230ee4871b25130da29ffd Command Injection |
|---|
| विवरण | The run_tests tool accepts an attacker-controlled command argument and executes it with shell=True. Because the parameter is not validated or restricted to known test runners, a malicious caller can inject arbitrary shell commands.
run_tests(repo_path, command) directly exposes command to callers.
subprocess.run(command, shell=True, cwd=repo_path, ...) executes the string through a shell.
No command allowlist or escaping is applied. |
|---|
| स्रोत | ⚠️ https://github.com/wing3e/public_exp/issues/38 |
|---|
| उपयोगकर्ता | BigW (UID 96422) |
|---|
| सबमिशन | 02/04/2026 03:16 PM (24 दिन पहले) |
|---|
| संयम | 24/04/2026 08:56 PM (22 days later) |
|---|
| स्थिति | स्वीकृत |
|---|
| VulDB प्रविष्टि | 359523 [Divyanshu-hash GitPilot-MCP तक 9ed9f153ba4158a2ad230ee4871b25130da29ffd main.py repo_path command अधिकार वृद्धि] |
|---|
| अंक | 20 |
|---|