漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
LibreChat's MCP Server Header Injection Enables OAuth Token Theft
Vulnerability Description
LibreChat is a ChatGPT clone with additional features. In versions 0.8.2-rc1 through 0.8.3-rc1, user-created MCP (Model Context Protocol) servers can include arbitrary HTTP headers that undergo credential placeholder substitution. An attacker can create a malicious MCP server with headers containing `{{LIBRECHAT_OPENID_ACCESS_TOKEN}}` (and others), causing victims who call tools on that server to have their OAuth tokens exfiltrated. Version 0.8.3-rc2 fixes the issue.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
Vulnerability Type
信息暴露
Vulnerability Title
LibreChat 信息泄露漏洞
Vulnerability Description
LibreChat是LibreChat开源的一个免费、高度可定制的统一 AI 对话平台,能够在一个界面中聚合并运行来自任意厂商的大模型。 LibreChat 0.8.2-rc1至0.8.3-rc1版本存在信息泄露漏洞,该漏洞源于用户创建的MCP服务器可包含经过凭据占位符替换的任意HTTP标头,可能导致攻击者创建包含特定令牌的恶意MCP服务器,致使调用该服务器上工具的受害者OAuth令牌被窃取。
CVSS Information
N/A
Vulnerability Type
N/A