| Title | dubydu sqlite-mcp 0.1.0 Pathname Traversal |
|---|
| Description | The extract_to_json MCP tool writes query results to the caller-controlled output_filename with no root restriction. The code appends a .json suffix if needed, but it does not canonicalize the destination or confine it to the database directory. This allows an attacker to write database contents to an arbitrary JSON path writable by the service account.
|
|---|
| Source | ⚠️ https://github.com/dubydu/sqlite-mcp/issues/1 |
|---|
| User | SmallW (UID 97245) |
|---|
| Submission | 04/10/2026 14:46 (18 days ago) |
|---|
| Moderation | 04/27/2026 16:05 (17 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 359806 [dubydu sqlite-mcp up to 0.1.0 src/entry.py extract_to_json output_filename sql injection] |
|---|
| Points | 19 |
|---|