|
|
Message-ID: <40888c89-bf79-f64b-4fd4-da9137d40615@apache.org> Date: Tue, 04 Nov 2025 12:37:33 +0000 From: Mingyu Chen <morningman@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2025-58337: Apache Doris-MCP-Server: Improper Access Control results in bypassing a "read-only" mode for doris-mcp-server MCP Server Severity: moderate Affected versions: - Apache Doris-MCP-Server 0.1.0 before 0.6.0 Description: An attacker with a valid read-only account can bypass Doris MCP Server’s read-only mode due to improper access control, allowing modifications that should have been prevented by read-only restrictions. Impact: Bypasses read-only mode; attackers with read-only access may perform unauthorized modifications. Recommended action for operators: Upgrade to version 0.6.0 as soon as possible (this release contains the fix). Credit: Liran Tal, (liran@...antal.com) (finder) References: https://doris.apache.org https://www.cve.org/CVERecord?id=CVE-2025-58337
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.