提出 #789765: atototo api-lab-mcp 0.2.1 Server-Side Request Forgery情報

タイトルatototo api-lab-mcp 0.2.1 Server-Side Request Forgery
説明A server-side request forgery (SSRF) vulnerability (CWE-918) has been identified in api-lab-mcp, specifically within the MCP tools analyze_api_spec, generate_test_scenarios, and test_http_endpoint. An attacker with network access to the MCP/HTTP interface can supply maliciously crafted input through the source or url arguments, which flow unsanitized into outbound HTTP requests via fetch or axios. This allows the server to make arbitrary requests to internal services, cloud metadata endpoints, or other restricted destinations, potentially leading to unauthorized information disclosure and further compromise. Versions up to and including 0.2.1 are confirmed affected.
ソース⚠️ https://github.com/atototo/api-lab-mcp/issues/4
ユーザー
 BruceJin (UID 96538)
送信2026年03月26日 06:53 (16 日 ago)
モデレーション2026年04月08日 19:10 (13 days later)
ステータス承諾済み
VulDBエントリ356288 [atototo api-lab-mcp 迄 0.2.1 HTTP Interface src/mcp/http-server.ts source/url 特権昇格]
ポイント20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!