florensiawidjaja BioinfoMCP Path Traversal Vulnerability
A path traversal vulnerability in florensiawidjaja BioinfoMCP allows remote attackers to write arbitrary files via manipulation of the 'Name' argument in the Upload function of app.py.
A path traversal vulnerability, identified as CVE-2026-7398, affects the BioinfoMCP platform developed by florensiawidjaja. The vulnerability resides in the Upload function within the bioinfo_mcp_platform/app.py file. An attacker can exploit this weakness remotely by manipulating the Name argument during file uploads, allowing them to write files to arbitrary locations on the server. This poses a significant security risk, potentially leading to code execution, data compromise, or denial of service. The exploit is publicly available, increasing the likelihood of exploitation. The BioinfoMCP project utilizes continuous delivery with rolling releases, making it difficult to determine specific affected and patched versions. The project has been notified through an issue report, but no response has been received.
Attack Chain
- An attacker identifies an accessible BioinfoMCP instance.
- The attacker crafts a malicious HTTP request targeting the Upload endpoint.
- Within the request, the ‘Name’ argument is manipulated to include path traversal sequences (e.g., ../../).
- The server-side application fails to properly sanitize or validate the ‘Name’ argument.
- The application constructs a file path using the attacker-controlled ‘Name’ argument.
- The application writes the uploaded file to the attacker-specified location outside of the intended upload directory.
- The attacker uploads a malicious file (e.g., a web shell or executable).
- The attacker executes the uploaded file, potentially gaining control of the server.
Impact
Successful exploitation of this path traversal vulnerability could allow an attacker to overwrite critical system files, execute arbitrary code on the server, and potentially gain complete control of the affected system. Due to the lack of specific versioning and deployment details, the number of potentially affected instances is unknown. However, given the publicly available exploit, any unpatched BioinfoMCP instance is at immediate risk of compromise. The impact includes potential data breaches, service disruption, and reputational damage.
Recommendation
- Inspect web server logs for suspicious requests containing path traversal sequences (e.g.,
../) in thecs-uri-querytargeting the/app.pyendpoint, activating the Sigma ruleDetect BioinfoMCP Path Traversal Attempt. - Deploy the Sigma rule
Detect BioinfoMCP Upload of Executable Filesto identify potential malicious file uploads following exploitation. - Implement strict input validation and sanitization on all user-supplied input, especially the ‘Name’ argument in the Upload function within the bioinfo_mcp_platform/app.py file, to mitigate CVE-2026-7398.
Detection coverage 2
Detect BioinfoMCP Path Traversal Attempt
highDetects attempts to exploit the path traversal vulnerability in BioinfoMCP by identifying requests with path traversal sequences.
Detect BioinfoMCP Upload of Executable Files
criticalDetects the upload of executable files to the BioinfoMCP server, which could be a result of a successful path traversal exploitation.
Detection queries are kept inside the platform. Get full rules →