제출 #789810: awwaiid mcp-server-taskwarrior <=1.0.1 Command Injection정보

제목awwaiid mcp-server-taskwarrior <=1.0.1 Command Injection
설명A command injection vulnerability exists in awwaiid/mcp-server-taskwarrior due to unsafe use of child_process.execSync when constructing TaskWarrior CLI commands with user-controlled input. Successful exploitation allows attackers to execute arbitrary shell commands with the privileges of the MCP server process.
원천⚠️ https://github.com/awwaiid/mcp-server-taskwarrior/issues/8
사용자
 Yinci Chen (UID 94659)
제출2026. 03. 26. AM 07:45 (21 날 ago)
모더레이션2026. 04. 08. PM 07:15 (13 days later)
상태수락
VulDB 항목356289 [awwaiid mcp-server-taskwarrior 까지 1.0.1 index.ts server.setRequestHandler 식별자 권한 상승]
포인트들19

Do you know our Splunk app?

Download it now for free!