提出 #785034: imprvhub mcp-browser-agent 0.8.0 Server-Side Request Forgery情報

タイトルimprvhub mcp-browser-agent 0.8.0 Server-Side Request Forgery
説明This proof of concept demonstrates a Server-Side Request Forgery (SSRF) vulnerability in the MCP browser agent. The vulnerability resides in the browser_navigate functionality, which allows an attacker to control the url parameter and navigate the browser to arbitrary destinations. By exploiting this flaw, an attacker can force the server to send requests to internal or external systems, potentially exposing sensitive information, accessing restricted resources, or delivering malicious content. This SSRF vulnerability could be leveraged to bypass network restrictions, scan internal networks, or exfiltrate data
ソース⚠️ https://github.com/wing3e/public_exp/issues/25
ユーザー
 feng kairui (UID 96539)
送信2026年03月21日 11:22 (22 日 ago)
モデレーション2026年04月05日 16:03 (15 days later)
ステータス承諾済み
VulDBエントリ355398 [imprvhub mcp-browser-agent 迄 0.8.0 URL Parameter src/handlers.ts CallToolRequestSchema request.params.name/request.params.arguments 特権昇格]
ポイント20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!