Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
MCP Registry: Open Redirect
Vulnerability Description
The MCP Registry provides MCP clients with a list of MCP servers, like an app store for MCP servers. From 1.1.0 to 1.7.4, the TrailingSlashMiddleware in internal/api/server.go is vulnerable to an open redirect attack. An attacker can craft a URL with a protocol-relative path (e.g., //evil.com/) that, after trailing slash removal, results in a Location header of //evil.com — which browsers interpret as an absolute URL to an external domain. This vulnerability is fixed in 1.7.5.
CVSS Information
N/A
Vulnerability Type
指向未可信站点的URL重定向(开放重定向)
Vulnerability Title
MCP Registry 输入验证错误漏洞
Vulnerability Description
MCP Registry是Model Context Protocol开源的一个MCP服务器应用商店。 MCP Registry 1.1.0至1.7.4版本存在输入验证错误漏洞,该漏洞源于TrailingSlashMiddleware存在开放重定向攻击,攻击者可构造协议相对路径的URL,在移除尾部斜杠后生成Location头为//evil.com,浏览器将其解释为外部域绝对URL。
CVSS Information
N/A
Vulnerability Type
N/A