提出 #620530: agno-agi agno v1.7.5 OS Command Injection情報

タイトルagno-agi agno v1.7.5 OS Command Injection
説明A critical Remote Code Execution (RCE) vulnerability exists in the Agno framework's MCP (Model Context Protocol) integration. The vulnerability allows arbitrary command execution through insufficient input validation in the `MCPTools` and `MultiMCPTools` classes. When user-controlled input is passed to the `command` parameter, it is directly processed by `shlex.split()` and passed to `StdioServerParameters` without any sanitization or validation, enabling attackers to execute arbitrary system commands with the privileges of the Agno agent process.
ソース⚠️ https://github.com/bayuncao-bit/vul-30
ユーザー
 bayuncao (UID 50143)
送信2025年07月22日 05:42 (9 月 ago)
モデレーション2025年08月06日 10:28 (15 days later)
ステータス承諾済み
VulDBエントリ319025 [agno-agi agno 迄 1.7.5 Model Context Protocol mcp.py MCPTools/MultiMCPTools command 特権昇格]
ポイント20

Do you want to use VulDB in your project?

Use the official API to access entries easily!