提交 #621376: agentuniverse-ai agentUniverse v0.0.18 OS Command Injection信息

标题agentuniverse-ai agentUniverse v0.0.18 OS Command Injection
描述Critical Remote Code Execution (RCE) vulnerabilities exist in the AgentUniverse framework's MCP (Model Context Protocol) implementation. The vulnerabilities allow arbitrary command execution through insufficient input validation in multiple components including MCPSessionManager, MCPTool, and MCPToolkit. When establishing connections to MCP servers, user-controlled input is directly passed to `StdioServerParameters` and subsequently to `anyio.open_process()` without any sanitization or validation, enabling attackers to execute arbitrary system commands with the privileges of the AgentUniverse process.
来源⚠️ https://github.com/bayuncao-bit/vul-37
用户
 bayuncao (UID 50143)
提交2025-07-23 09時14分 (9 月前)
管理2025-08-07 12時46分 (15 days later)
状态已接受
VulDB条目319127 [agentUniverse 直到 0.0.18 MCPSessionManager/MCPTool/MCPToolkit StdioServerParameters 权限提升]
积分20

Want to know what is going to be exploited?

We predict KEV entries!