提出 #795355: chatboxai chatbox 1.20.0 Arbitrary Command Execution情報

タイトルchatboxai chatbox 1.20.0 Arbitrary Command Execution
説明Chatbox v1.20.0 contains an arbitrary command execution vulnerability in the MCP (Model Context Protocol) stdio transport IPC handler. The mcp:stdio-transport:create IPC channel accepts command, args, and env parameters directly from the renderer process and spawns a child process via StdioClientTransport without any validation, sanitization, or command allowlisting. Since ipcRenderer.invoke is directly exposed via the Electron context bridge (see chatbox_02), any JavaScript running in the renderer context can execute arbitrary system commands with the full privileges of the Electron main process.
ソース⚠️ https://github.com/chatboxai/chatbox/issues/3627
ユーザー
 Yu_Bao (UID 89348)
送信2026年04月02日 11:03 (15 日 ago)
モデレーション2026年04月12日 06:30 (10 days later)
ステータス承諾済み
VulDBエントリ356993 [chatboxai chatbox 迄 1.20.0 Model Context Protocol Server Management System ipc-stdio-transport.ts StdioClientTransport args/env 特権昇格]
ポイント20

Might our Artificial Intelligence support you?

Check our Alexa App!