SafeDep vet
is vulnerable to a DNS rebinding attack due to lack of HTTP Host
and Origin
header validation.
To exploit this vulnerability following conditions must be met:
- A
vet
scan is executed and reports are saved as sqlite3
database
- A
vet
MCP server is running on default port with SSE transport that has access to the report database
- The attacker lures the victim to attacker controlled website
- Attacker leverages DNS rebinding to access
vet
SSE server on 127.0.0.1
through the website
- Attacker uses MCP tools to read information from report database
Impact
Data from vet
scan sqlite3 database may be exposed to remote attackers when vet
is used as an MCP server in SSE mode with default ports through the sqlite3 query MCP tool.
Patches
v1.12.5
is released that patches the issue with Host
and Origin
header allow list and validation
Workarounds
- Use
stdio
(default) transport for SSE server
References
SafeDep
vet
is vulnerable to a DNS rebinding attack due to lack of HTTPHost
andOrigin
header validation.To exploit this vulnerability following conditions must be met:
vet
scan is executed and reports are saved assqlite3
databasevet
MCP server is running on default port with SSE transport that has access to the report databasevet
SSE server on127.0.0.1
through the websiteImpact
Data from
vet
scan sqlite3 database may be exposed to remote attackers whenvet
is used as an MCP server in SSE mode with default ports through the sqlite3 query MCP tool.Patches
v1.12.5
is released that patches the issue withHost
andOrigin
header allow list and validationWorkarounds
stdio
(default) transport for SSE serverReferences