Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Missing Host Header Validation in Apollo MCP Server for Localhost Deployments
Vulnerability Description
Apollo MCP Server is a Model Context Protocol server that exposes GraphQL operations as MCP tools. Prior to version 1.7.0, the Apollo MCP Server did not validate the Host header on incoming HTTP requests when using StreamableHTTP transport. In configurations where an HTTP-based MCP server is run on localhost without additional authentication or network-level controls, this could potentially allow a malicious website—visited by a user running the server locally—to use DNS rebinding techniques to bypass same-origin policy restrictions and issue requests to the local MCP server. If successfully exploited, this could allow an attacker to invoke tools or access resources exposed by the MCP server on behalf of the local user. This issue is limited to HTTP-based transport modes (StreamableHTTP). It does not affect servers using stdio transport. The practical risk is further reduced in deployments that use authentication, network-level access controls, or are not bound to localhost. This vulnerability is fixed in 1.7.0.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Vulnerability Type
源验证错误
Vulnerability Title
Apollo MCP Server 访问控制错误漏洞
Vulnerability Description
Apollo MCP Server是Apollo GraphQL开源的一个将GraphQL操作暴露为AI工具的服务端。 Apollo MCP Server 1.7.0之前版本存在访问控制错误漏洞,该漏洞源于使用StreamableHTTP传输时未验证传入HTTP请求的Host标头,可能导致恶意网站通过DNS重绑定技术绕过同源策略限制并发起请求。
CVSS Information
N/A
Vulnerability Type
N/A