漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
eiceblue spire-doc-mcp-server base.py get_doc_path path traversal
Vulnerability Description
A vulnerability was detected in eiceblue spire-doc-mcp-server 1.0.0. This affects the function get_doc_path of the file src/spire_doc_mcp/api/base.py. Performing a manipulation of the argument document_name results in path traversal. The attack can be initiated remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Vulnerability Title
Spire.Doc MCP Server 路径遍历漏洞
Vulnerability Description
Spire.Doc MCP Server是E-iceblue Product Family个人开发者的一款无需Microsoft Word即可操作Word文档的工具。 Spire.Doc MCP Server 1.0.0版本存在路径遍历漏洞,该漏洞源于文件src/spire_doc_mcp/api/base.py中函数get_doc_path的参数document_name操作导致路径遍历,可能允许远程攻击。
CVSS Information
N/A
Vulnerability Type
N/A