Skip to content

Conversation

superboy-zjc
Copy link
Contributor

@superboy-zjc superboy-zjc commented Aug 6, 2025

fix the critical RCE issue. See report

Copy link
Member

@olaservo olaservo left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hi @superboy-zjc , thanks for the PR. Do we need to use this exact library for this, or is there an alternative that is maintained by more than 1 person?

@cliffhall
Copy link
Member

Hi @superboy-zjc , thanks for the PR. Do we need to use this exact library for this, or is there an alternative that is maintained by more than 1 person?

Or perhaps the sanitize functionality can just be inlined to eliminate dependency altogether.

@superboy-zjc
Copy link
Contributor Author

Hi @superboy-zjc , thanks for the PR. Do we need to use this exact library for this, or is there an alternative that is maintained by more than 1 person?

Or perhaps the sanitize functionality can just be inlined to eliminate dependency altogether.

Yeah I think we can inline the protocol check here to only allow http and https protocol and don't have to handle url encoding things.

@cliffhall
Copy link
Member

Hi @superboy-zjc , thanks for the PR. Do we need to use this exact library for this, or is there an alternative that is maintained by more than 1 person?

Or perhaps the sanitize functionality can just be inlined to eliminate dependency altogether.

Yeah I think we can inline the protocol check here to only allow http and https protocol and don't have to handle url encoding things.

Thanks @superboy-zjc If you can make that change, I'll approve and merge it and it will go into a new release shortly.

@superboy-zjc
Copy link
Contributor Author

superboy-zjc commented Aug 11, 2025

Hi @superboy-zjc , thanks for the PR. Do we need to use this exact library for this, or is there an alternative that is maintained by more than 1 person?

Or perhaps the sanitize functionality can just be inlined to eliminate dependency altogether.

Yeah I think we can inline the protocol check here to only allow http and https protocol and don't have to handle url encoding things.

Thanks @superboy-zjc If you can make that change, I'll approve and merge it and it will go into a new release shortly.

I will do it shortly👍

@superboy-zjc
Copy link
Contributor Author

Hi there @cliffhall @olaservo I updated a clean patch for this.

@cliffhall cliffhall enabled auto-merge August 12, 2025 16:55
cliffhall
cliffhall previously approved these changes Aug 12, 2025
Copy link
Member

@cliffhall cliffhall left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM! 👍

@superboy-zjc
Copy link
Contributor Author

Mind requesting a CVE for this?😊 @cliffhall

auto-merge was automatically disabled August 12, 2025 18:26

Head branch was pushed to by a user without write access

@superboy-zjc
Copy link
Contributor Author

superboy-zjc commented Aug 12, 2025

I fixed the style error and make sure it passes all the ci workflow

@cliffhall cliffhall self-requested a review August 12, 2025 20:27
Copy link
Member

@cliffhall cliffhall left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM! 👍

@cliffhall cliffhall enabled auto-merge August 12, 2025 20:27
@cliffhall cliffhall merged commit 2feac76 into modelcontextprotocol:main Aug 12, 2025
5 checks passed
@superboy-zjc
Copy link
Contributor Author

Hi @cliffhall @olaservo May I ask for the help for the CVE ID assignment on this report? I am a security researcher and need a CVE ID to get credit from the report. I've submitted the report to HackerOne before help patching this but no one triaged it. Could anyone guide me proceeding with this or help ping the security team? Thanks

@cliffhall
Copy link
Member

cliffhall commented Aug 19, 2025

Hi @cliffhall @olaservo May I ask for the help for the CVE ID assignment on this report? I am a security researcher and need a CVE ID to get credit from the report. I've submitted the report to HackerOne before help patching this but no one triaged it. Could anyone guide me proceeding with this or help ping the security team? Thanks

We're in progress on that. @jenn-newton at Anthropic is working on a PR because she wants a reusable address validator. She will be handling getting the CVE. Don't worry, it is being handled, but I think has just gone on Jenn is on holiday though, so it might be a week or so. She has your document outlining the problem that was fixed.

@superboy-zjc
Copy link
Contributor Author

superboy-zjc commented Aug 19, 2025

Hi @cliffhall @olaservo May I ask for the help for the CVE ID assignment on this report? I am a security researcher and need a CVE ID to get credit from the report. I've submitted the report to HackerOne before help patching this but no one triaged it. Could anyone guide me proceeding with this or help ping the security team? Thanks

We're in progress on that. @jenn-newton at Anthropic is working on a PR because she wants a reusable address validator. She will be handling getting the CVE. Don't worry, it is being handled, but I think Jenn has just gone on is on holiday though, so it might be a week or so. She has your document outlining the problem that was fixed.

I appreciate your help!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants