Описание
Mastra Docs MCP Server @mastra/mcp-docs-server Leads to Information Exposure
The Mastra Docs MCP Server package @mastra/mcp-docs-server is a server designed to provide documentation context to AI agentic workflows, such as those used in AI-powered IDEs.
Resources:
Overview
The @mastra/mcp-docs-server package in versions 0.13.18 and below is vulnerable to a Directory Traversal attack that results in the disclosure of directory listings. The code contains a security check to prevent path traversal for reading file contents, but this check is effectively bypassed by subsequent logic that attempts to find directory suggestions. An attacker can leverage this flaw to list the contents of arbitrary directories on the user's filesystem, including the user's home directory, exposing sensitive information about the file system's structure.
Vulnerability
The tool's code attempts to prevent path traversal within the readMdxContent function. It correctly checks if the resolved path is within the intended base directory. If the check fails, it logs an error and returns { found: false }.
File: src/tools/docs.ts
However, the main execute function that calls readMdxContent contains a logical flaw. Even when result.found is false, the code proceeds to call findNearestDirectory(path, availablePaths), which does not perform any path validation. This allows the un-sanitized path to be used for directory listing.
File: src/tools/docs.ts
This logical error means the initial security check is rendered ineffective, as the subsequent code path leaks directory information using the malicious path.
Exploitation
An attacker can exploit this vulnerability through prompt injection in an AI coding assistant like Cursor IDE, which uses the MCP server. By crafting a prompt that instructs the AI agent to use a traversal path, the attacker can trick the tool into listing directories outside of its intended scope.
A malicious prompt could be:
This leads to the tool returning a list of directories from the user's home directory, as seen in the LLM's response:
This output confirms the successful traversal and listing of the user's home directory contents.
Proof of Concept
- Configure Cursor IDE: In the
.cursor/mcp.jsonfile, define the Mastra MCP server:{ "mcpServers": { "mastra": { "command": "npx", "args": ["-y", "@mastra/mcp-docs-server"] } } } - Enable the MCP server within the IDE.
- Initiate a new chat and use the malicious prompt provided above.
- Observe the output, which will contain the directory listing from the root of the user's home directory.
Attached screenshot confirming the vulnerability:
Impact
The vulnerability exposes the user's file system structure. This information disclosure (CWE-200) can reveal the presence of sensitive tools (.BurpSuite), configuration files (.config), cloud credentials (.aws/, .gcp/), and private project directories. This information could be invaluable to an attacker for planning further, more targeted attacks.
Recommendation
It's recommended to apply the following fixes:
- Halt Execution on Failure: Consider modifying the
executefunction to immediately stop processing a path if thereadMdxContentfunction detects a path traversal attempt.// ... const result = await readMdxContent(path, queryKeywords); if (!result.found) { // If the file isn't found (especially due to path traversal), // return an error immediately without trying to find suggestions. return { path, content: null, error: "Path not found or access denied.", }; } // ... continue with safe logic - Defense-in-Depth: Apply the same path validation logic used in
readMdxContentto thefindNearestDirectoryfunction to ensure it cannot operate outside the intended base directory.
Credit
Disclosed by Liran Tal
Пакеты
@mastra/mcp-docs-server
<= 0.13.8
0.17.0
Связанные уязвимости
Mastra is a Typescript framework for building AI agents and assistants. Versions 0.13.8 through 0.13.20-alpha.0 are vulnerable to a Directory Traversal attack that results in the disclosure of directory listings. The code contains a security check to prevent path traversal for reading file contents, but this check is effectively bypassed by subsequent logic that attempts to find directory suggestions. An attacker can leverage this flaw to list the contents of arbitrary directories on the user's filesystem, including the user's home directory, exposing sensitive information about the file system's structure. This issue is fixed in version 0.13.20.