漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
@mobilenext/mobile-mcp alllows arbitrary file write via Path Traversal in mobile screen capture tools
Vulnerability Description
Mobile Next is an MCP server for mobile development and automation. Prior to version 0.0.49, the `@mobilenext/mobile-mcp` server contains a Path Traversal vulnerability in the `mobile_save_screenshot` and `mobile_start_screen_recording` tools. The `saveTo` and `output` parameters were passed directly to filesystem operations without validation, allowing an attacker to write files outside the intended workspace. Version 0.0.49 fixes the issue.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Vulnerability Title
Mobile Next 安全漏洞
Vulnerability Description
Mobile Next是Mobile Next开源的一个移动应用自动化开发与测试工具。 Mobile Next 0.0.49之前版本存在安全漏洞,该漏洞源于saveTo和output参数未经验证直接传递到文件系统操作,可能导致路径遍历攻击。
CVSS Information
N/A
Vulnerability Type
N/A