Skip to content

Commit 638c17f

Browse files
committed
rename cmd injection category
1 parent dcefd8a commit 638c17f

19 files changed

+57
-57
lines changed

MCP-Security-Command-Injection/CommandInjectionBase64Encoding.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,9 @@ info:
1818
or full system compromise. Additionally, it can bypass security measures that
1919
rely on filtering or validation of user input, escalating the risk of exploitation.
2020
category:
21-
name: MCP
22-
shortName: MCP
23-
displayName: Model Context Protocol (MCP) Security
21+
name: MCP_MALICIOUS_CODE_EXECUTION
22+
shortName: MCP_MALICIOUS_CODE_EXECUTION
23+
displayName: MCP - Malicious Code Execution
2424
subCategory: MCP_COMMAND_INJECTION_BASE64_ENCODING
2525
severity: CRITICAL
2626
tags:

MCP-Security-Command-Injection/CommandInjectionBase64EncodingChained.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -25,9 +25,9 @@ info:
2525
to detect and prevent the attack, increasing the risk of severe consequences for
2626
system integrity and confidentiality.
2727
category:
28-
name: MCP
29-
shortName: MCP
30-
displayName: Model Context Protocol (MCP) Security
28+
name: MCP_MALICIOUS_CODE_EXECUTION
29+
shortName: MCP_MALICIOUS_CODE_EXECUTION
30+
displayName: MCP - Malicious Code Execution
3131
subCategory: MCP_COMMAND_INJECTION_BASE64_ENCODING_CHAINED
3232
severity: CRITICAL
3333
tags:

MCP-Security-Command-Injection/CommandInjectionCentOS.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -27,9 +27,9 @@ info:
2727
to CentOS. Accurate identification allows attackers to craft more effective and
2828
focused attacks, potentially leading to greater damage and security breaches.
2929
category:
30-
name: MCP
31-
shortName: MCP
32-
displayName: Model Context Protocol (MCP) Security
30+
name: MCP_MALICIOUS_CODE_EXECUTION
31+
shortName: MCP_MALICIOUS_CODE_EXECUTION
32+
displayName: MCP - Malicious Code Execution
3333
subCategory: MCP_COMMAND_INJECTION_CENTOS
3434
severity: MEDIUM
3535
tags:

MCP-Security-Command-Injection/CommandInjectionCookieHeaderChained.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,9 +26,9 @@ info:
2626
enabling complex attacks that compromise system security, escalate privileges,
2727
and expose sensitive information.
2828
category:
29-
name: MCP
30-
shortName: MCP
31-
displayName: Model Context Protocol (MCP) Security
29+
name: MCP_MALICIOUS_CODE_EXECUTION
30+
shortName: MCP_MALICIOUS_CODE_EXECUTION
31+
displayName: MCP - Malicious Code Execution
3232
subCategory: MCP_COMMAND_INJECTION_COOKIE_HEADER_CHAINED
3333
severity: CRITICAL
3434
tags:

MCP-Security-Command-Injection/CommandInjectionCurl.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,9 @@ info:
2121
attacks, including data breaches or system compromise, and significantly undermine
2222
the security posture of the organization.
2323
category:
24-
name: MCP
25-
shortName: MCP
26-
displayName: Model Context Protocol (MCP) Security
24+
name: MCP_MALICIOUS_CODE_EXECUTION
25+
shortName: MCP_MALICIOUS_CODE_EXECUTION
26+
displayName: MCP - Malicious Code Execution
2727
subCategory: MCP_COMMAND_INJECTION_CURL_HTTP_REQUEST
2828
severity: CRITICAL
2929
tags:

MCP-Security-Command-Injection/CommandInjectionCurlHTTPRequestWithChainedCommands.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -28,9 +28,9 @@ info:
2828
This can lead to unauthorized access, data breaches, and a comprehensive understanding
2929
of the target system, increasing the risk of successful attacks and security compromises.
3030
category:
31-
name: MCP
32-
shortName: MCP
33-
displayName: Model Context Protocol (MCP) Security
31+
name: MCP_MALICIOUS_CODE_EXECUTION
32+
shortName: MCP_MALICIOUS_CODE_EXECUTION
33+
displayName: MCP - Malicious Code Execution
3434
subCategory: MCP_COMMAND_INJECTION_CURL_HTTP_REQUEST_CHAINED_COMMANDS
3535
severity: CRITICAL
3636
tags:

MCP-Security-Command-Injection/CommandInjectionMacOS.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,9 +24,9 @@ info:
2424
escalation, data theft, or system compromise, as the attack is customized to the
2525
system's architecture and security features.
2626
category:
27-
name: MCP
28-
shortName: MCP
29-
displayName: Model Context Protocol (MCP) Security
27+
name: MCP_MALICIOUS_CODE_EXECUTION
28+
shortName: MCP_MALICIOUS_CODE_EXECUTION
29+
displayName: MCP - Malicious Code Execution
3030
subCategory: MCP_COMMAND_INJECTION_MACOS
3131
severity: CRITICAL
3232
tags:

MCP-Security-Command-Injection/CommandInjectionRHEL.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -29,9 +29,9 @@ info:
2929
allows attackers to perform more effective and damaging attacks, potentially leading
3030
to significant security breaches.
3131
category:
32-
name: MCP
33-
shortName: MCP
34-
displayName: Model Context Protocol (MCP) Security
32+
name: MCP_MALICIOUS_CODE_EXECUTION
33+
shortName: MCP_MALICIOUS_CODE_EXECUTION
34+
displayName: MCP - Malicious Code Execution
3535
subCategory: MCP_COMMAND_INJECTION_RHEL
3636
severity: CRITICAL
3737
tags:

MCP-Security-Command-Injection/CommandInjectionTimeDelay.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,9 @@ info:
2121
vulnerability can also facilitate more sophisticated attacks, posing significant
2222
security risks to the application.
2323
category:
24-
name: MCP
25-
shortName: MCP
26-
displayName: Model Context Protocol (MCP) Security
24+
name: MCP_MALICIOUS_CODE_EXECUTION
25+
shortName: MCP_MALICIOUS_CODE_EXECUTION
26+
displayName: MCP - Malicious Code Execution
2727
subCategory: MCP_COMMAND_INJECTION_TIME_DELAY
2828
severity: MEDIUM
2929
tags:

MCP-Security-Command-Injection/CommandInjectionTimeDelayWithChainedCommands.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -28,9 +28,9 @@ info:
2828
The ability to manipulate timing adds complexity to the attack, enhancing its
2929
effectiveness and impact.
3030
category:
31-
name: MCP
32-
shortName: MCP
33-
displayName: Model Context Protocol (MCP) Security
31+
name: MCP_MALICIOUS_CODE_EXECUTION
32+
shortName: MCP_MALICIOUS_CODE_EXECUTION
33+
displayName: MCP - Malicious Code Execution
3434
subCategory: MCP_COMMAND_INJECTION_TIME_DELAY_CHAINED
3535
severity: MEDIUM
3636
tags:

0 commit comments

Comments
 (0)