Securing MCP integrations.
Building dev tools & Obsidian plugins.
Robust Host header validation and CSRF protections are crucial.
For a full technical breakdown, read the advisory:
mcpsec.dev/advisories/...
Robust Host header validation and CSRF protections are crucial.
For a full technical breakdown, read the advisory:
mcpsec.dev/advisories/...
I am grateful for their excellent triaging.
I am grateful for their excellent triaging.
An immediate update to the patched version, v0.4.0, is recommended.
An immediate update to the patched version, v0.4.0, is recommended.
The page performs the DNS rebind, tricking the browser into communicating directly with the local Neo4j service on the attacker's behalf.
The page performs the DNS rebind, tricking the browser into communicating directly with the local Neo4j service on the attacker's behalf.
Neo4j rated this vulnerability as CVSS 4.0 High severity (7.4).
Neo4j rated this vulnerability as CVSS 4.0 High severity (7.4).
The vulnerability allows a malicious website to send arbitrary queries to this endpoint.
The vulnerability allows a malicious website to send arbitrary queries to this endpoint.
Default to:
- localhost binding
- stdio transport when possible
- Host/Origin validation for SSE/HTTP
Default to:
- localhost binding
- stdio transport when possible
- Host/Origin validation for SSE/HTTP
Aug 30: Report submitted
Sep 01: Acknowledged
Sep 02: PR raised with fix
Sep 05: v1.12.5 released (5 days!)
Sep 29: GHSA published
v1.12.5 adds Host/Origin header validation. Update now!
Aug 30: Report submitted
Sep 01: Acknowledged
Sep 02: PR raised with fix
Sep 05: v1.12.5 released (5 days!)
Sep 29: GHSA published
v1.12.5 adds Host/Origin header validation. Update now!
- Victim must visit malicious site while MCP server is running
- SSE transport must be explicitly enabled (not default)
- Requires browser with EventSource support
- Timing window needed
- Victim must visit malicious site while MCP server is running
- SSE transport must be explicitly enabled (not default)
- Requires browser with EventSource support
- Timing window needed
- Package names & versions in your projects
- Known CVEs affecting your dependencies
- Vulnerability severity scores
- Supply chain intelligence
Perfect recon for targeted attacks against your infrastructure.
- Package names & versions in your projects
- Known CVEs affecting your dependencies
- Vulnerability severity scores
- Supply chain intelligence
Perfect recon for targeted attacks against your infrastructure.
When running vet server mcp --server-type sse, an attacker could:
- Establish an MCP session via DNS rebinding
- Invoke the sql_query tool
- Execute arbitrary READ queries against your scan database
When running vet server mcp --server-type sse, an attacker could:
- Establish an MCP session via DNS rebinding
- Invoke the sql_query tool
- Execute arbitrary READ queries against your scan database
1. Victim visits attacker(.)com
2. DNS initially points to attacker's server
3. After browser caches the origin, DNS changes to localhost
4. Now attacker(.)com JS talks to victim's localhost
5. Browser's Same-Origin Policy is bypassed
1. Victim visits attacker(.)com
2. DNS initially points to attacker's server
3. After browser caches the origin, DNS changes to localhost
4. Now attacker(.)com JS talks to victim's localhost
5. Browser's Same-Origin Policy is bypassed
So many companies are shipping coding agents.
Assume all of them are more interested in market capture than the preservation of your data confidentiality.
Because as we see here...
YMMV
So many companies are shipping coding agents.
Assume all of them are more interested in market capture than the preservation of your data confidentiality.
Because as we see here...
YMMV
I enjoyed using Amp before reading wunderwuzzi's post and started prodding Amp.
Now I cannot use Amp because it leaves me, my users, and my company exposed.
Amp is working on a patch - but come on this is probably a one liner - why leave us exposed.
I enjoyed using Amp before reading wunderwuzzi's post and started prodding Amp.
Now I cannot use Amp because it leaves me, my users, and my company exposed.
Amp is working on a patch - but come on this is probably a one liner - why leave us exposed.
Regardless of where you use Amp - you are vulnerable.
Regardless of where you use Amp - you are vulnerable.
Modify Amp's settings to request permissions for network based commands such as dig.
Adding permission guardrails for echo and tr decreases the ease with which an attacker can steak your data is a second layer of defense.
Modify Amp's settings to request permissions for network based commands such as dig.
Adding permission guardrails for echo and tr decreases the ease with which an attacker can steak your data is a second layer of defense.