漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Missing Host Header Validation in Apollo MCP Server for Localhost Deployments
Vulnerability Description
Apollo MCP Server is a Model Context Protocol server that exposes GraphQL operations as MCP tools. Prior to version 1.7.0, the Apollo MCP Server did not validate the Host header on incoming HTTP requests when using StreamableHTTP transport. In configurations where an HTTP-based MCP server is run on localhost without additional authentication or network-level controls, this could potentially allow a malicious website—visited by a user running the server locally—to use DNS rebinding techniques to bypass same-origin policy restrictions and issue requests to the local MCP server. If successfully exploited, this could allow an attacker to invoke tools or access resources exposed by the MCP server on behalf of the local user. This issue is limited to HTTP-based transport modes (StreamableHTTP). It does not affect servers using stdio transport. The practical risk is further reduced in deployments that use authentication, network-level access controls, or are not bound to localhost. This vulnerability is fixed in 1.7.0.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Vulnerability Type
源验证错误
Vulnerability Title
Apollo MCP Server 访问控制错误漏洞
Vulnerability Description
Apollo MCP Server是Apollo GraphQL开源的一个将GraphQL操作暴露为AI工具的服务端。 Apollo MCP Server 1.7.0之前版本存在访问控制错误漏洞,该漏洞源于使用StreamableHTTP传输时未验证传入HTTP请求的Host标头,可能导致恶意网站通过DNS重绑定技术绕过同源策略限制并发起请求。
CVSS Information
N/A
Vulnerability Type
N/A