🕳️ Vulnerabilities & CVEs

AWS MCP Server's LFI Flaw: Authenticated Users Reading /etc/passwd via CLI Tricks

An authenticated user just needed a clever CLI shortcut to peek at AWS server files. Varonis's find in the Remote MCP Server rips open a hole even 'NO_ACCESS' couldn't plug.

Diagram of AWS MCP LFI attack reading /etc/passwd via CLI shorthand syntax

⚡ Key Takeaways

  • LFI via AWS CLI shorthand (@=file://) bypasses NO_ACCESS in MCP Server, exposing host files like /etc/passwd. 𝕏
  • Impacts public AWS endpoint; patched in v1.3.9—upgrade all instances and forks now. 𝕏
  • Pattern alert: Remote CLI wrappers risk turning local features into remote leaks. 𝕏
Published by

CVE Watch

Threat intelligence. Zero noise.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by Varonis Blog

Stay in the loop

The week's most important stories from CVE Watch, delivered once a week.