chore(deps): update rust crate rmcp to v1 [security]#3277
Open
renovate[bot] wants to merge 1 commit intomainfrom
Open
chore(deps): update rust crate rmcp to v1 [security]#3277renovate[bot] wants to merge 1 commit intomainfrom
renovate[bot] wants to merge 1 commit intomainfrom
Conversation
Contributor
Author
|
a06870d to
6282cf9
Compare
6282cf9 to
93a0d51
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
0.10.0→1.0.0rmcp Streamable HTTP server transport has a DNS rebinding vulnerability
CVE-2026-42559 / GHSA-89vp-x53w-74fx
More information
Details
Summary
Prior to version 1.4.0, the
rmcpcrate's Streamable HTTP server transport (crates/rmcp/src/transport/streamable_http_server/) did not validate the incomingHostheader. This allowed a malicious public website, via a DNS rebinding attack, to send authenticated requests to an MCP server running on the victim's loopback or private-network interface — violating the MCP specification's transport security guidance.Impact
An attacker who convinces a victim to visit a malicious page can:
Because MCP servers frequently run with the user's privileges and expose developer tooling (filesystems, shells, browser control, language servers, etc.), the practical impact can extend to arbitrary code execution on the victim's machine.
Affected Versions
rmcp < 1.4.0— all prior releases of the Streamable HTTP server transport. Non-HTTP transports (stdio, child-process) are not affected.Patched Versions
rmcp >= 1.4.0(current: 1.5.1).Patch
Fixed in PR #764 (commit
8e22aa2), released as v1.4.0 on 2026-04-09:StreamableHttpServerConfig::allowed_hostsnow defaults to a loopback-only allowlist:["localhost", "127.0.0.1", "::1"].validate_dns_rebinding_headers(), which parses theHostheader and returns HTTP 403 if the host is not on the allowlist.StreamableHttpService::with_allowed_hosts(...), or opt out (not recommended without an upstream reverse proxy that validatesHost) viadisable_allowed_hosts().This fix validates the
Hostheader only.Originheader validation is tracked as a defense-in-depth follow-up in #822 and is not required to block the DNS rebinding attack described here — the browser cannot forge the Host header sent to the rebound server.Workarounds for Unpatched Users
rmcp >= 1.4.0.Hostheader is not one of your expected hostnames.0.0.0.0without such a proxy.Resources
Related advisories (same class of vulnerability)
Severity
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HReferences
This data is provided by the GitHub Advisory Database (CC-BY 4.0).
Release Notes
modelcontextprotocol/rust-sdk (rmcp)
v1.4.0Compare Source
Added
Fixed
Other
v1.3.0Compare Source
Added
Fixed
Other
v1.2.0Compare Source
Added
Fixed
Other
v1.1.1Compare Source
Fixed
v1.1.0Compare Source
Added
Other
v1.0.0Compare Source
Fixed
v0.17.0Compare Source
Added
Fixed
Other
v0.16.0Compare Source
Added
Fixed
Other
v0.15.0Compare Source
Added
Fixed
execution.taskSupporton tools (#635)Other
v0.14.0Compare Source
Fixed
Other
v0.13.0Compare Source
Added
Fixed
Other
v0.12.0Compare Source
Added
Fixed
Other
v0.11.0Compare Source
Added
Fixed
Other
Configuration
📅 Schedule: (UTC)
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.