提出 #785858: assafelovic gpt-researcher 3.4.3 Unauthenticated Remote Code Execution情報

タイトルassafelovic gpt-researcher 3.4.3 Unauthenticated Remote Code Execution
説明GPT Researcher v3.4.3 and earlier versions are vulnerable to **unauthenticated Remote Code Execution (RCE)** via the WebSocket `/ws` endpoint. An attacker can send a WebSocket message containing a `mcp_configs` parameter with an arbitrary `command` and `args` array. These values are passed through the application without any validation or sanitization, ultimately reaching `anyio.open_process()` which spawns the attacker-specified process on the server. No authentication is required. The attacker has full control over the executed command, its arguments, and the environment variables of the spawned process.
ソース⚠️ https://github.com/assafelovic/gpt-researcher/issues/1694
ユーザー
 Yu-Bao (UID 96702)
送信2026年03月23日 03:31 (25 日 ago)
モデレーション2026年04月05日 21:12 (14 days later)
ステータス承諾済み
VulDBエントリ355419 [assafelovic gpt-researcher 迄 3.4.3 ws Endpoint server_utils.py extract_command_data args 特権昇格]
ポイント20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!