| 标题 | GitHub mcp-maigret v1.0.12 Command Injection |
|---|
| 描述 | The `username` parameter of the `search_username` tool provided by MCP is externally controllable. This tool uses the `child_process.exec` function, which allows users to execute arbitrary code.
I mentioned the vulnerability in issue https://github.com/BurtTheCoder/mcp-maigret/issues/9 , and the author fixed it at https://github.com/BurtTheCoder/mcp-maigret/commit/b1ae073c4b3e789ab8de36dc6ca8111ae9399e7a |
|---|
| 来源 | ⚠️ https://github.com/BurtTheCoder/mcp-maigret/commit/b1ae073c4b3e789ab8de36dc6ca8111ae9399e7a |
|---|
| 用户 | Lexpl0it (UID 89340) |
|---|
| 提交 | 2026-01-27 04時50分 (3 月前) |
|---|
| 管理 | 2026-02-06 21時49分 (11 days later) |
|---|
| 状态 | 已接受 |
|---|
| VulDB条目 | 344765 [BurtTheCoder mcp-maigret 直到 1.0.12 search_username src/index.ts 用户名 权限提升] |
|---|
| 积分 | 20 |
|---|