Unauthorized access vulnerability in sse modes
Closed this issue · 0 comments
August829 commented
https://github.com/litmusautomation/litmus-mcp-server
There is a problem with the code. We found that there is no identity verification for the user access sse, so that anyone can access this sse.
https://github.com/litmusautomation/litmus-mcp-server?tab=readme-ov-file#usage

And according to the instructions, the default is bound to 0.0.0.0. We will follow the documentation instructions to build a test.
docker run -d --name litmus-mcp-server -p 8000:8000 ghcr.io/litmusautomation/litmus-mcp-server:main
Then we tested unauthorized access
We use the MCP tool to connect to the test under:
In this way, we can control a MCP using litmus-mcp-server
