提交 #747171: GitHub mcp-maigret v1.0.12 Command Injection信息

标题GitHub mcp-maigret v1.0.12 Command Injection
描述The `username` parameter of the `search_username` tool provided by MCP is externally controllable. This tool uses the `child_process.exec` function, which allows users to execute arbitrary code. I mentioned the vulnerability in issue https://github.com/BurtTheCoder/mcp-maigret/issues/9 , and the author fixed it at https://github.com/BurtTheCoder/mcp-maigret/commit/b1ae073c4b3e789ab8de36dc6ca8111ae9399e7a
来源⚠️ https://github.com/BurtTheCoder/mcp-maigret/commit/b1ae073c4b3e789ab8de36dc6ca8111ae9399e7a
用户
 Lexpl0it (UID 89340)
提交2026-01-27 04時50分 (3 月前)
管理2026-02-06 21時49分 (11 days later)
状态已接受
VulDB条目344765 [BurtTheCoder mcp-maigret 直到 1.0.12 search_username src/index.ts 用户名 权限提升]
积分20

Interested in the pricing of exploits?

See the underground prices here!