漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
ezequiroga mcp-bases research_server.py search_papers path traversal
Vulnerability Description
A vulnerability was detected in ezequiroga mcp-bases 357ca19c7a49a9b9cb2ef639b366f03aba8bea39/c630b8ab0f970614d42da8e566e9c0d15a16414c. This impacts the function search_papers of the file research_server.py. Performing a manipulation of the argument topic results in path traversal. Remote exploitation of the attack is possible. The exploit is now public and may be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Vulnerability Title
MCP Research Assistant 路径遍历漏洞
Vulnerability Description
MCP Research Assistant是ezequiroga个人开发者的一款学术论文搜索与分析工具。 MCP Research Assistant存在路径遍历漏洞,该漏洞源于文件research_server.py中函数search_papers的参数topic操作不当,可能导致路径遍历。
CVSS Information
N/A
Vulnerability Type
N/A