Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
geekgod382 filesystem-mcp-server read_file_tool/write_file_tool server.py is_path_allowed path traversal
Vulnerability Description
A security vulnerability has been detected in geekgod382 filesystem-mcp-server 1.0.0. This issue affects the function is_path_allowed of the file server.py of the component read_file_tool/write_file_tool. Such manipulation leads to path traversal. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 1.1.0 is capable of addressing this issue. The name of the patch is 45364545fc60dc80aadcd4379f08042d3d3d292e. Upgrading the affected component is advised.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Vulnerability Title
Filesystem MCP Server 路径遍历漏洞
Vulnerability Description
Filesystem MCP Server是Manan Sharma个人开发者的一个提供全面的文件系统访问和操作的上下文协议。 Filesystem MCP Server 1.0.0版本存在路径遍历漏洞,该漏洞源于文件server.py中函数is_path_allowed操作不当,可能导致路径遍历。
CVSS Information
N/A
Vulnerability Type
N/A