Skip to content

Commit 20aec29

Browse files
1 parent cde10da commit 20aec29

File tree

4 files changed

+240
-36
lines changed

4 files changed

+240
-36
lines changed
Lines changed: 57 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-9xwc-hfwc-8w59",
4+
"modified": "2025-12-17T22:50:29Z",
5+
"published": "2025-12-17T22:50:29Z",
6+
"aliases": [
7+
"CVE-2025-68144"
8+
],
9+
"summary": " mcp-server-git argument injection in git_diff and git_checkout functions allows overwriting local files",
10+
"details": "In mcp-server-git versions prior to 2025.12.17, the git_diff and git_checkout functions passed user-controlled arguments directly to git CLI commands without sanitization. Flag-like values (e.g., `--output=/path/to/file` for `git_diff`) would be interpreted as command-line options rather than git refs, enabling arbitrary file overwrites. The fix adds validation that rejects arguments starting with - and verifies the argument resolves to a valid git ref via rev_parse before execution. Users are advised to update to 2025.12.17 resolve this issue when it is released.\n\nThank you to https://hackerone.com/yardenporat for reporting.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:H/SA:L"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "mcp-server-git"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "2025.11.25"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/modelcontextprotocol/servers/security/advisories/GHSA-9xwc-hfwc-8w59"
42+
},
43+
{
44+
"type": "PACKAGE",
45+
"url": "https://github.com/modelcontextprotocol/servers"
46+
}
47+
],
48+
"database_specific": {
49+
"cwe_ids": [
50+
"CWE-88"
51+
],
52+
"severity": "MODERATE",
53+
"github_reviewed": true,
54+
"github_reviewed_at": "2025-12-17T22:50:29Z",
55+
"nvd_published_at": null
56+
}
57+
}
Lines changed: 57 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-j22h-9j4x-23w5",
4+
"modified": "2025-12-17T22:50:38Z",
5+
"published": "2025-12-17T22:50:38Z",
6+
"aliases": [
7+
"CVE-2025-68145"
8+
],
9+
"summary": "mcp-server-git has missing path validation when using --repository flag",
10+
"details": "In mcp-server-git versions prior to 2025.12.17, when the server is started with the --repository flag to restrict operations to a specific repository path, it did not validate that repo_path arguments in subsequent tool calls were actually within that configured path. This could allow tool calls to operate on other repositories accessible to the server process. The fix adds path validation that resolves both the configured repository and the requested path (following symlinks) and verifies the requested path is within the allowed repository before executing any git operations. Users are advised to upgrade to 2025.12.17 upon release to remediate this issue.\n\nThank you to https://hackerone.com/yardenporat for reporting.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "mcp-server-git"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "2025.11.25"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/modelcontextprotocol/servers/security/advisories/GHSA-j22h-9j4x-23w5"
42+
},
43+
{
44+
"type": "PACKAGE",
45+
"url": "https://github.com/modelcontextprotocol/servers"
46+
}
47+
],
48+
"database_specific": {
49+
"cwe_ids": [
50+
"CWE-22"
51+
],
52+
"severity": "MODERATE",
53+
"github_reviewed": true,
54+
"github_reviewed_at": "2025-12-17T22:50:38Z",
55+
"nvd_published_at": null
56+
}
57+
}
Lines changed: 126 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,126 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-jf5h-xfw4-p8gp",
4+
"modified": "2025-12-17T22:49:46Z",
5+
"published": "2025-12-17T15:34:53Z",
6+
"aliases": [
7+
"CVE-2025-13352"
8+
],
9+
"summary": "Mattermost GitHub Plugin Bot Identity Validation Bypass Allows Arbitrary GitHub Reaction Injection",
10+
"details": "Mattermost versions 10.11.x <= 10.11.6 and Mattermost GitHub plugin versions <=2.4.0 fail to validate plugin bot identity in reaction forwarding which allows attackers to hijack the GitHub reaction feature to make users add reactions to arbitrary GitHub objects via crafted notification posts.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Go",
21+
"name": "github.com/mattermost/mattermost/server/v8"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "10.11.0-rc1"
29+
},
30+
{
31+
"fixed": "10.11.7-0.20251106103514-3b05384dd014"
32+
}
33+
]
34+
}
35+
]
36+
},
37+
{
38+
"package": {
39+
"ecosystem": "Go",
40+
"name": "github.com/mattermost/mattermost"
41+
},
42+
"ranges": [
43+
{
44+
"type": "ECOSYSTEM",
45+
"events": [
46+
{
47+
"introduced": "0"
48+
},
49+
{
50+
"fixed": "10.11.7-0.20251106103514-3b05384dd014"
51+
}
52+
]
53+
}
54+
]
55+
},
56+
{
57+
"package": {
58+
"ecosystem": "Go",
59+
"name": "github.com/mattermost/mattermost"
60+
},
61+
"ranges": [
62+
{
63+
"type": "ECOSYSTEM",
64+
"events": [
65+
{
66+
"introduced": "11.0.0-alpha.1"
67+
},
68+
{
69+
"fixed": "11.1.0"
70+
}
71+
]
72+
}
73+
]
74+
},
75+
{
76+
"package": {
77+
"ecosystem": "Go",
78+
"name": "github.com/mattermost/mattermost-plugin-github"
79+
},
80+
"ranges": [
81+
{
82+
"type": "ECOSYSTEM",
83+
"events": [
84+
{
85+
"introduced": "0"
86+
},
87+
{
88+
"fixed": "1.0.1-0.20250829075715-0deffcfc6bee"
89+
}
90+
]
91+
}
92+
]
93+
}
94+
],
95+
"references": [
96+
{
97+
"type": "ADVISORY",
98+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13352"
99+
},
100+
{
101+
"type": "WEB",
102+
"url": "https://github.com/mattermost/mattermost-plugin-github/commit/0deffcfc6bee7eaf01f7c99100e3d12e8d9df68c"
103+
},
104+
{
105+
"type": "WEB",
106+
"url": "https://github.com/mattermost/mattermost/commit/3b05384dd0146c1be3caa620a42e00e46027055d"
107+
},
108+
{
109+
"type": "PACKAGE",
110+
"url": "https://github.com/mattermost/mattermost"
111+
},
112+
{
113+
"type": "WEB",
114+
"url": "https://mattermost.com/security-updates"
115+
}
116+
],
117+
"database_specific": {
118+
"cwe_ids": [
119+
"CWE-1287"
120+
],
121+
"severity": "LOW",
122+
"github_reviewed": true,
123+
"github_reviewed_at": "2025-12-17T22:49:46Z",
124+
"nvd_published_at": "2025-12-17T13:15:56Z"
125+
}
126+
}

advisories/unreviewed/2025/12/GHSA-jf5h-xfw4-p8gp/GHSA-jf5h-xfw4-p8gp.json

Lines changed: 0 additions & 36 deletions
This file was deleted.

0 commit comments

Comments
 (0)