Obot Authorization Bypass in /mcp-connect/{id} Endpoint
Obot version 0.21.0 has an authorization bypass vulnerability in the `/mcp-connect/{id}` endpoint allowing any authenticated user to connect to any registered MCP server, regardless of permissions, leading to unauthorized access and actions on upstream services.
Obot version 0.21.0 is vulnerable to an authorization bypass in the /mcp-connect/{id} endpoint. This flaw allows any authenticated user, even those without explicit permissions, to connect to any registered MCP server. The vulnerability stems from a missing access control check on the /mcp-connect/{mcp_id} gateway endpoint. This means that any user possessing an MCP Server ID can connect to that server through the gateway and make tool calls, effectively circumventing intended restrictions. This critical vulnerability could enable unauthorized access to sensitive data and operations on upstream third-party services accessible via Obot’s stored OAuth credentials.
Attack Chain
- An attacker identifies a target MCP server ID.
- The attacker authenticates to Obot with a basic user account.
- The attacker crafts a malicious POST request to
/mcp-connect/<mcp_server_id>. - The request includes a valid Obot session cookie or API key in the
Authorizationheader. - The request body contains a JSON-RPC payload to list available tools on the MCP server:
{"jsonrpc":"2.0","id":1,"method":"tools/list"}. - The attacker observes a successful response, confirming access to the MCP server’s tools, bypassing intended access controls.
- The attacker crafts a subsequent JSON-RPC request to call a sensitive tool:
{"jsonrpc":"2.0","id":2,"method":"tools/call", "params":{"name":"<sensitive_tool>","arguments":{...}}}. - The attacker executes the tool call successfully, gaining access to data and functionality normally restricted to authorized users, leveraging the MCP server’s OAuth credentials.
Impact
This vulnerability allows unauthorized users to access and manipulate sensitive data within connected MCP servers. The severity of the impact depends on the capabilities exposed by the affected MCP servers and the scope of their stored OAuth credentials. A successful exploit could lead to unauthorized data exfiltration, modification of critical systems, or other malicious activities, potentially impacting a wide range of services integrated with Obot, and could affect any number of Obot users.
Recommendation
- Upgrade to a patched version of Obot that addresses the authorization bypass vulnerability.
- Monitor web server logs for POST requests to
/mcp-connect/with unusual user agents or API keys, using theDetect Obot MCP Connect Authorization BypassSigma rule. - Implement strict access control policies for MCP server registrations to limit the potential blast radius of a successful exploit.
- Review and restrict the permissions granted to Obot’s stored OAuth credentials to minimize the impact of unauthorized access.
Detection coverage 2
Detect Obot MCP Connect Authorization Bypass
criticalDetects unauthorized access to the /mcp-connect endpoint in Obot, indicating a potential authorization bypass attempt.
Detect Obot MCP Tool Call via POST
highDetects POST requests to Obot's MCP endpoints with JSON-RPC payloads indicative of tool execution, potentially exploiting authorization bypass.
Detection queries are available on the platform. Get full rules →