漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Azure Data Explorer MCP Server: KQL Injection in multiple tools allows MCP client to execute arbitrary Kusto queries
Vulnerability Description
Azure Data Explorer MCP Server is a Model Context Protocol (MCP) server that enables AI assistants to execute KQL queries and explore Azure Data Explorer (ADX/Kusto) databases through standardized interfaces. Versions up to and including 0.1.1 contain KQL (Kusto Query Language) injection vulnerabilities in three MCP tool handlers: `get_table_schema`, `sample_table_data`, and `get_table_details`. The `table_name` parameter is interpolated directly into KQL queries via f-strings without any validation or sanitization, allowing an attacker (or a prompt-injected AI agent) to execute arbitrary KQL queries against the Azure Data Explorer cluster. Commit 0abe0ee55279e111281076393e5e966335fffd30 patches the issue.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
Vulnerability Type
数据查询逻辑中特殊元素的不当中和
Vulnerability Title
Azure Data Explorer MCP Server 安全漏洞
Vulnerability Description
Azure Data Explorer MCP Server是Pavel Shklovsky个人开发者的一个连接AI助手与数据仓库的查询协议服务器。 Azure Data Explorer MCP Server 0.1.1及之前版本存在安全漏洞,该漏洞源于table_name参数未经任何验证或清理直接插入KQL查询,可能导致KQL注入攻击。
CVSS Information
N/A
Vulnerability Type
N/A