You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
"description": "This module exploits a remote code execution vulnerability in Flowise versions >= 2.2.7-patch.1\n and < 3.0.1. The vulnerability exists in the customMCP endpoint (/api/v1/node-load-method/customMCP)\n located in packages/components/nodes/tools/MCP/CustomMCP/CustomMCP.ts and packages/components/nodes/tools/MCP/core.ts,\n which allows users to execute arbitrary commands via StdioClientTransport by using the 'x-request-from: internal' header.\n When FLOWISE_USERNAME and FLOWISE_PASSWORD are not configured, the exploit works unauthenticated. If Basic Auth is\n enabled, the FLOWISE_USERNAME and FLOWISE_PASSWORD options must be set to provide credentials.",
"description": "This module exploits a remote code execution vulnerability in Flowise versions >= 2.2.7-patch.1\n and < 3.0.6. The vulnerability exists in the customMCP endpoint (/api/v1/node-load-method/customMCP)\n located in packages/components/nodes/tools/MCP/CustomMCP/CustomMCP.ts, which allows users to execute\n arbitrary commands via JavaScript code injection in the mcpServerConfig parameter using the\n convertToValidJSONString function that uses Function('return ' + inputString)(). For versions < 3.0.1,\n the exploit can work unauthenticated if FLOWISE_USERNAME and FLOWISE_PASSWORD environment variables\n are not configured. For versions >= 3.0.1, authentication via FLOWISE_EMAIL and FLOWISE_PASSWORD is\n required due to JWT token verification.",
"description": "This module create persistence by adding a malicious plugin to Notepad++, as it blindly loads and executes DLL from its plugin directory on startup, meaning that the payload will be executed every time Notepad++ is launched.",
0 commit comments