Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Wireshark MCP: Arbitrary file write via export_objects when WIRESHARK_MCP_ALLOWED_DIRS is not configured
Vulnerability Description
Wireshark MCP is an MCP Server that turns tshark into a structured analysis interface, then layers in optional Wireshark suite utilities. In 1.1.5 and earlier, wireshark-mcp exposes a wireshark_export_objects MCP tool that accepts an attacker-controlled dest_dir parameter and passes it to tshark's --export-objects flag with no mandatory path restriction. The path sandbox (_allowed_dirs) is None by default and only activates when the environment variable WIRESHARK_MCP_ALLOWED_DIRS is explicitly set. In a default installation, any directory on the filesystem can be used as the export destination.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Vulnerability Title
Wireshark MCP 路径遍历漏洞
Vulnerability Description
Wireshark MCP是Bpple个人开发者的一款网络数据包智能分析工具。 Wireshark MCP 1.1.5及之前版本存在路径遍历漏洞,该漏洞源于wireshark_export_objects MCP工具接受攻击者控制的dest_dir参数并将其传递给tshark的--export-objects标志而无强制路径限制,路径沙箱默认为None且仅当显式设置环境变量WIRESHARK_MCP_ALLOWED_DIRS时才激活,在默认安装中文件系统上的任何目录都可用作导出目标。
CVSS Information
N/A
Vulnerability Type
N/A