<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Auth-Fetch-Mcp — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/auth-fetch-mcp/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 15:48:49 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/auth-fetch-mcp/feed.xml" rel="self" type="application/rss+xml"/><item><title>auth-fetch-mcp SSRF and Disk Exfiltration Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-auth-fetch-mcp-ssrf/</link><pubDate>Tue, 19 May 2026 15:48:49 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-auth-fetch-mcp-ssrf/</guid><description>The auth-fetch-mcp package is vulnerable to server-side request forgery (SSRF) and disk exfiltration due to unvalidated URLs in the `download_media` and `auth_fetch` tools, allowing an attacker to fetch internal resources, cloud metadata, or loopback addresses, potentially leading to credential theft, internal service enumeration, and sensitive information disclosure.</description><content:encoded><![CDATA[<p>The <code>auth-fetch-mcp</code> package is vulnerable to server-side request forgery (SSRF) and disk exfiltration. The <code>download_media</code> and <code>auth_fetch</code> tools within the package accept arbitrary URLs without proper validation, allowing a malicious MCP client to force the server to fetch internal resources, cloud metadata endpoints, or loopback addresses. This vulnerability can be exploited to steal cloud credentials, enumerate internal services, and access sensitive information. The <code>download_media</code> tool further exacerbates the risk by writing the fetched content to a user-controlled output directory, enabling data exfiltration. This vulnerability affects versions 3.0.0 and earlier of the <code>auth-fetch-mcp</code> package.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious prompt that instructs the LLM-based MCP client to call either the <code>auth_fetch</code> or <code>download_media</code> tool.</li>
<li>The malicious prompt includes a URL targeting an internal resource, such as a cloud metadata endpoint (e.g., <code>http://169.254.169.254/latest/meta-data/iam/security-credentials/&lt;role&gt;</code>), a loopback service (e.g., <code>http://127.0.0.1:6379</code>), or an internal admin page (e.g., <code>http://192.168.0.1</code>).</li>
<li>If the <code>auth_fetch</code> tool is called, the <code>url</code> is passed directly to <code>page.goto</code> function in <code>src/browser.ts</code>, causing the Playwright browser to navigate to the specified URL without validation.</li>
<li>The <code>auth_fetch</code> tool extracts the DOM content of the fetched page using the <code>extractContent</code> function and returns it to the attacker.</li>
<li>If the <code>download_media</code> tool is called, the provided URLs are iterated, and <code>ctx.request.get(url)</code> is called for each URL in <code>src/tools.ts</code>, fetching the content without validation.</li>
<li>The response body from the fetched URL is written to a file in the user-specified <code>output_dir</code> using <code>fs.writeFileSync</code> in <code>src/tools.ts</code>.</li>
<li>The attacker retrieves the fetched data from either the <code>auth_fetch</code> tool&rsquo;s response or from the files written to disk by the <code>download_media</code> tool.</li>
<li>The attacker obtains sensitive information, such as cloud credentials, internal service configurations, or other confidential data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the theft of cloud credentials, allowing attackers to gain unauthorized access to cloud resources. Internal service enumeration can reveal valuable information about the network infrastructure and potential attack vectors. Access to loopback services can expose sensitive data or allow for further exploitation of vulnerable applications. The disk-write side channel in <code>download_media</code> can enable data exfiltration to shared directories, potentially impacting co-tenant processes. The scope of impact depends on the privileges and access controls of the MCP server environment, the sensitivity of accessible internal resources, and the extent to which the LLM can be prompted to expose these vulnerabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement URL validation in both the <code>auth_fetch</code> and <code>download_media</code> tools to prevent SSRF attacks, using the <code>assertSafeUrl</code> function described in the advisory. Apply the validation at <code>tools.ts:236</code> and <code>browser.ts:53</code>.</li>
<li>Restrict the <code>output_dir</code> parameter in the <code>download_media</code> tool to a fixed root directory to prevent writing files to arbitrary locations.</li>
<li>Monitor network connections originating from the MCP server for connections to internal IP addresses (127.0.0.0/8, 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16, 169.254.0.0/16) using a network monitoring solution.</li>
<li>Deploy the Sigma rule &ldquo;Detect auth-fetch-mcp download_media Disk Write to Unusual Directory&rdquo; to detect potential exfiltration attempts via unusual output directories.</li>
<li>Block the IOCs listed in the IOC table at your network perimeter to prevent the exploitation of the SSRF vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>disk-exfiltration</category><category>auth-fetch-mcp</category></item></channel></rss>