| 제목 | assafelovic gpt-researcher 3.4.3 Unauthenticated Remote Code Execution |
|---|
| 설명 | GPT Researcher v3.4.3 and earlier versions are vulnerable to **unauthenticated Remote Code Execution (RCE)** via the WebSocket `/ws` endpoint. An attacker can send a WebSocket message containing a `mcp_configs` parameter with an arbitrary `command` and `args` array. These values are passed through the application without any validation or sanitization, ultimately reaching `anyio.open_process()` which spawns the attacker-specified process on the server. No authentication is required. The attacker has full control over the executed command, its arguments, and the environment variables of the spawned process. |
|---|
| 원천 | ⚠️ https://github.com/assafelovic/gpt-researcher/issues/1694 |
|---|
| 사용자 | Yu-Bao (UID 96702) |
|---|
| 제출 | 2026. 03. 23. AM 03:31 (24 날 ago) |
|---|
| 모더레이션 | 2026. 04. 05. PM 09:12 (14 days later) |
|---|
| 상태 | 수락 |
|---|
| VulDB 항목 | 355419 [assafelovic gpt-researcher 까지 3.4.3 ws Endpoint server_utils.py extract_command_data args 권한 상승] |
|---|
| 포인트들 | 20 |
|---|