| 제목 | wonderwhy-er DesktopCommanderMCP 0.2.13 Improper Neutralization |
|---|
| 설명 | Command Blocklist Bypass Via Command Substitution
The command validation logic in the CommandManager class class is vulnerable to a bypass when an attacker uses shell command substitution syntax, such as $(...) or backticks (`...`). The parser does not recognise or recursively validate commands nested within this syntax. This allows a blocked command (e.g., sudo) to be executed by embedding it within an allowed command (like echo).
This vulnerability allows a malicious actor to completely bypass the command blocklist, leading to arbitrary command execution. A malicious prompt could bypass the blocklist and run any command. The severity would vary depending on the privileges of the user running the server. |
|---|
| 원천 | ⚠️ https://github.com/wonderwhy-er/DesktopCommanderMCP/issues/217 |
|---|
| 사용자 | crem (UID 91252) |
|---|
| 제출 | 2025. 10. 03. AM 07:16 (6 개월 ago) |
|---|
| 모더레이션 | 2025. 10. 08. PM 12:53 (5 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 327610 [wonderwhy-er DesktopCommanderMCP 까지 0.2.13 src/command-manager.ts CommandManager 권한 상승] |
|---|
| 포인트들 | 20 |
|---|