漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
elinsky execution-system-mcp add_action Tool server.py _get_context_file_path path traversal
Vulnerability Description
A flaw has been found in elinsky execution-system-mcp 0.1.0. The impacted element is the function _get_context_file_path of the file src/execution_system_mcp/server.py of the component add_action Tool. This manipulation of the argument context causes path traversal. The attack can be initiated remotely. The exploit has been published and may be used.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Vulnerability Title
Execution System MCP Server 路径遍历漏洞
Vulnerability Description
Execution System MCP Server是Brian Elinsky个人开发者的一个AI原生执行系统服务器。 Execution System MCP Server 0.1.0版本存在路径遍历漏洞,该漏洞源于组件add_action Tool中文件src/execution_system_mcp/server.py的函数_get_context_file_path的参数context操作导致路径遍历,可能允许远程攻击。
CVSS Information
N/A
Vulnerability Type
N/A