漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
MCP Registry: Open Redirect
Vulnerability Description
The MCP Registry provides MCP clients with a list of MCP servers, like an app store for MCP servers. From 1.1.0 to 1.7.4, the TrailingSlashMiddleware in internal/api/server.go is vulnerable to an open redirect attack. An attacker can craft a URL with a protocol-relative path (e.g., //evil.com/) that, after trailing slash removal, results in a Location header of //evil.com — which browsers interpret as an absolute URL to an external domain. This vulnerability is fixed in 1.7.5.
CVSS Information
N/A
Vulnerability Type
指向未可信站点的URL重定向(开放重定向)
Vulnerability Title
MCP Registry 输入验证错误漏洞
Vulnerability Description
MCP Registry是Model Context Protocol开源的一个MCP服务器应用商店。 MCP Registry 1.1.0至1.7.4版本存在输入验证错误漏洞,该漏洞源于TrailingSlashMiddleware存在开放重定向攻击,攻击者可构造协议相对路径的URL,在移除尾部斜杠后生成Location头为//evil.com,浏览器将其解释为外部域绝对URL。
CVSS Information
N/A
Vulnerability Type
N/A