제출 #620530: agno-agi agno v1.7.5 OS Command Injection정보

제목agno-agi agno v1.7.5 OS Command Injection
설명A critical Remote Code Execution (RCE) vulnerability exists in the Agno framework's MCP (Model Context Protocol) integration. The vulnerability allows arbitrary command execution through insufficient input validation in the `MCPTools` and `MultiMCPTools` classes. When user-controlled input is passed to the `command` parameter, it is directly processed by `shlex.split()` and passed to `StdioServerParameters` without any sanitization or validation, enabling attackers to execute arbitrary system commands with the privileges of the Agno agent process.
원천⚠️ https://github.com/bayuncao-bit/vul-30
사용자
 bayuncao (UID 50143)
제출2025. 07. 22. AM 05:42 (9 개월 ago)
모더레이션2025. 08. 06. AM 10:28 (15 days later)
상태수락
VulDB 항목319025 [agno-agi agno 까지 1.7.5 Model Context Protocol mcp.py MCPTools/MultiMCPTools command 권한 상승]
포인트들20

Interested in the pricing of exploits?

See the underground prices here!