litmusautomation/litmus-mcp-server

Unauthorized access vulnerability in sse modes

Closed this issue · 0 comments

https://github.com/litmusautomation/litmus-mcp-server

Image

There is a problem with the code. We found that there is no identity verification for the user access sse, so that anyone can access this sse.

https://github.com/litmusautomation/litmus-mcp-server?tab=readme-ov-file#usage
Image

And according to the instructions, the default is bound to 0.0.0.0. We will follow the documentation instructions to build a test.

docker run -d --name litmus-mcp-server -p 8000:8000 ghcr.io/litmusautomation/litmus-mcp-server:main

Image

Then we tested unauthorized access

Image

We use the MCP tool to connect to the test under:

Image

In this way, we can control a MCP using litmus-mcp-server

Image Image