<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Modelcontextprotocol — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/modelcontextprotocol/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 07 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/modelcontextprotocol/feed.xml" rel="self" type="application/rss+xml"/><item><title>rmcp Streamable HTTP Server Transport DNS Rebinding Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-rmcp-dns-rebinding/</link><pubDate>Thu, 07 May 2026 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-rmcp-dns-rebinding/</guid><description>The `rmcp` crate before v1.4.0 is vulnerable to DNS rebinding attacks via the Streamable HTTP server transport due to missing Host header validation, potentially allowing arbitrary code execution on a victim's machine if they visit a malicious website.</description><content:encoded><![CDATA[<p>The <code>rmcp</code> crate, a Rust SDK for the Model Context Protocol (MCP), contains a DNS rebinding vulnerability in its Streamable HTTP server transport. Prior to version 1.4.0, the server did not validate the <code>Host</code> header of incoming HTTP requests. This allows a remote attacker to bypass the Same-Origin Policy by exploiting DNS rebinding techniques. By convincing a victim to visit a malicious website, the attacker can make authenticated requests to an MCP server running on the victim&rsquo;s loopback or private network interface. This can lead to the enumeration and invocation of tools exposed by the MCP server, potentially resulting in arbitrary code execution with the victim&rsquo;s privileges. The vulnerability was patched in version 1.4.0 by introducing <code>Host</code> header validation with an allowlist.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker hosts a malicious website with a DNS name configured to perform DNS rebinding.</li>
<li>Victim visits the attacker&rsquo;s website, initiating the DNS rebinding attack.</li>
<li>The victim&rsquo;s browser resolves the attacker&rsquo;s domain to a loopback IP address (e.g., 127.0.0.1) or a private network IP.</li>
<li>The browser sends an HTTP request to the MCP server running on the victim&rsquo;s machine, using the attacker&rsquo;s malicious domain in the <code>Host</code> header.</li>
<li>The vulnerable <code>rmcp</code> server, lacking <code>Host</code> header validation prior to v1.4.0, accepts the request as if it originated from a trusted source.</li>
<li>The attacker&rsquo;s website sends authenticated requests to the MCP server, leveraging existing credentials or sessions.</li>
<li>The attacker enumerates available tools and resources exposed by the MCP server.</li>
<li>The attacker invokes tools with malicious intent, potentially leading to file writes, shell execution, API calls, or other actions limited only by the server&rsquo;s exposed functionalities, resulting in arbitrary code execution on the victim&rsquo;s machine.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to enumerate and invoke any tool exposed by a locally-running <code>rmcp</code>-based MCP server, read resources and state accessible via the MCP session, and trigger side effects like file writes or shell execution. Given that MCP servers frequently run with user privileges and expose developer tooling, the practical impact can extend to arbitrary code execution on the victim&rsquo;s machine. This vulnerability affects users running versions of the <code>rmcp</code> crate prior to 1.4.0.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>rmcp</code> version 1.4.0 or later to incorporate the fix for CVE-2026-42559.</li>
<li>If upgrading is not feasible, implement a reverse proxy (e.g., nginx, Caddy) in front of the MCP server and configure it to validate the <code>Host</code> header, as outlined in the advisory under &ldquo;Workarounds for Unpatched Users.&rdquo;</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Host Header</code> to identify potentially malicious requests targeting internal services.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>dns-rebinding</category><category>vulnerability</category><category>rmcp</category><category>http</category><category>attack</category></item></channel></rss>