Отправить #795355: chatboxai chatbox 1.20.0 Arbitrary Command ExecutionИнформация

Названиеchatboxai chatbox 1.20.0 Arbitrary Command Execution
ОписаниеChatbox v1.20.0 contains an arbitrary command execution vulnerability in the MCP (Model Context Protocol) stdio transport IPC handler. The mcp:stdio-transport:create IPC channel accepts command, args, and env parameters directly from the renderer process and spawns a child process via StdioClientTransport without any validation, sanitization, or command allowlisting. Since ipcRenderer.invoke is directly exposed via the Electron context bridge (see chatbox_02), any JavaScript running in the renderer context can execute arbitrary system commands with the full privileges of the Electron main process.
Источник⚠️ https://github.com/chatboxai/chatbox/issues/3627
Пользователь
 Yu_Bao (UID 89348)
Представление02.04.2026 11:03 (12 дни назад)
Модерация12.04.2026 06:30 (10 days later)
Статуспринято
Запись VulDB356993 [chatboxai chatbox до 1.20.0 Model Context Protocol Server Management System ipc-stdio-transport.ts StdioClientTransport args/env эскалация привилегий]
Баллы20

Do you want to use VulDB in your project?

Use the official API to access entries easily!