<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Matlab-Mcp-Server — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/matlab-mcp-server/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/matlab-mcp-server/feed.xml" rel="self" type="application/rss+xml"/><item><title>Path Traversal Vulnerability in WilliamCloudQi matlab-mcp-server</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-matlab-mcp-server-path-traversal/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-matlab-mcp-server-path-traversal/</guid><description>A path traversal vulnerability exists in WilliamCloudQi matlab-mcp-server up to version ab88f6b9bf5f36f725e8628029f7f6dd0d9913ca, allowing a remote attacker to manipulate the scriptPath argument in the generate_matlab_code/execute_matlab_code function to access arbitrary files.</description><content:encoded><![CDATA[<p>A path traversal vulnerability, identified as CVE-2026-7272, affects WilliamCloudQi&rsquo;s matlab-mcp-server up to commit ab88f6b9bf5f36f725e8628029f7f6dd0d9913ca. The vulnerability resides within the MCP Interface component, specifically in the <code>generate_matlab_code/execute_matlab_code</code> function of the <code>src/index.ts</code> file. A remote attacker can exploit this flaw by manipulating the <code>scriptPath</code> argument, allowing them to traverse the file system and potentially access sensitive files or execute arbitrary code on the server. This vulnerability is remotely exploitable, and an exploit is publicly available. The vendor was notified but has not yet responded. This poses a significant risk to systems running vulnerable versions of matlab-mcp-server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of WilliamCloudQi matlab-mcp-server running a version up to ab88f6b9bf5f36f725e8628029f7f6dd0d9913ca.</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>generate_matlab_code</code> or <code>execute_matlab_code</code> function.</li>
<li>The malicious request includes a manipulated <code>scriptPath</code> argument containing path traversal sequences (e.g., <code>../</code>, <code>..%2f</code>).</li>
<li>The server-side code, without proper validation, uses the attacker-controlled <code>scriptPath</code> to access a file.</li>
<li>The attacker uses the path traversal to navigate to a sensitive file outside the intended directory (e.g., <code>/etc/passwd</code>).</li>
<li>The server reads the contents of the arbitrary file due to the path traversal.</li>
<li>The server includes the contents of the sensitive file in the response sent back to the attacker.</li>
<li>The attacker retrieves the sensitive information from the server&rsquo;s response, such as configuration files, credentials, or source code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows a remote attacker to read arbitrary files on the server. This can lead to the disclosure of sensitive information, including configuration files, credentials, source code, or other data stored on the server&rsquo;s file system. This information can then be used for further attacks, such as privilege escalation or lateral movement within the network. The number of potential victims is unknown, but any system running a vulnerable version of matlab-mcp-server is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply appropriate input validation and sanitization to the <code>scriptPath</code> argument in the <code>generate_matlab_code</code> and <code>execute_matlab_code</code> functions to prevent path traversal attacks.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts targeting this vulnerability.</li>
<li>Monitor web server logs for suspicious requests containing path traversal sequences (e.g., <code>../</code>, <code>..%2f</code>) in the <code>scriptPath</code> parameter.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-vulnerability</category></item></channel></rss>