提交 #785034: imprvhub mcp-browser-agent 0.8.0 Server-Side Request Forgery信息

标题imprvhub mcp-browser-agent 0.8.0 Server-Side Request Forgery
描述This proof of concept demonstrates a Server-Side Request Forgery (SSRF) vulnerability in the MCP browser agent. The vulnerability resides in the browser_navigate functionality, which allows an attacker to control the url parameter and navigate the browser to arbitrary destinations. By exploiting this flaw, an attacker can force the server to send requests to internal or external systems, potentially exposing sensitive information, accessing restricted resources, or delivering malicious content. This SSRF vulnerability could be leveraged to bypass network restrictions, scan internal networks, or exfiltrate data
来源⚠️ https://github.com/wing3e/public_exp/issues/25
用户
 feng kairui (UID 96539)
提交2026-03-21 11時22分 (22 日前)
管理2026-04-05 16時03分 (15 days later)
状态已接受
VulDB条目355398 [imprvhub mcp-browser-agent 直到 0.8.0 URL Parameter src/handlers.ts CallToolRequestSchema request.params.name/request.params.arguments 权限提升]
积分20

Interested in the pricing of exploits?

See the underground prices here!