제출 #795355: chatboxai chatbox 1.20.0 Arbitrary Command Execution정보

제목chatboxai chatbox 1.20.0 Arbitrary Command Execution
설명Chatbox v1.20.0 contains an arbitrary command execution vulnerability in the MCP (Model Context Protocol) stdio transport IPC handler. The mcp:stdio-transport:create IPC channel accepts command, args, and env parameters directly from the renderer process and spawns a child process via StdioClientTransport without any validation, sanitization, or command allowlisting. Since ipcRenderer.invoke is directly exposed via the Electron context bridge (see chatbox_02), any JavaScript running in the renderer context can execute arbitrary system commands with the full privileges of the Electron main process.
원천⚠️ https://github.com/chatboxai/chatbox/issues/3627
사용자
 Yu_Bao (UID 89348)
제출2026. 04. 02. AM 11:03 (13 날 ago)
모더레이션2026. 04. 12. AM 06:30 (10 days later)
상태수락
VulDB 항목356993 [chatboxai chatbox 까지 1.20.0 Model Context Protocol Server Management System ipc-stdio-transport.ts StdioClientTransport args/env 권한 상승]
포인트들20

Want to know what is going to be exploited?

We predict KEV entries!