제출 #795502: Divyanshu-hash GitPilot-MCP 9ed9f153ba4158a2ad230ee4871b25130da29ffd Command Injection정보

제목Divyanshu-hash GitPilot-MCP 9ed9f153ba4158a2ad230ee4871b25130da29ffd Command Injection
설명The run_tests tool accepts an attacker-controlled command argument and executes it with shell=True. Because the parameter is not validated or restricted to known test runners, a malicious caller can inject arbitrary shell commands. run_tests(repo_path, command) directly exposes command to callers. subprocess.run(command, shell=True, cwd=repo_path, ...) executes the string through a shell. No command allowlist or escaping is applied.
원천⚠️ https://github.com/wing3e/public_exp/issues/38
사용자
 BigW (UID 96422)
제출2026. 04. 02. PM 03:16 (24 날 ago)
모더레이션2026. 04. 24. PM 08:56 (22 days later)
상태수락
VulDB 항목359523 [Divyanshu-hash GitPilot-MCP 까지 9ed9f153ba4158a2ad230ee4871b25130da29ffd main.py repo_path command 권한 상승]
포인트들20

Do you need the next level of professionalism?

Upgrade your account now!