what is Burpsuite MCP Server?
Burpsuite MCP Server is a Model Context Protocol (MCP) server that provides an interface for interacting with Burpsuite Professional's scanning and proxy functionality, enabling AI assistants to perform web security testing and vulnerability scanning.
how to use Burpsuite MCP Server?
To use the Burpsuite MCP Server, set it up by building the server and configuring it in your MCP settings. You can then interact with it through various commands to start scans, check statuses, and retrieve results.
key features of Burpsuite MCP Server?
- Start vulnerability scans on target URLs
- Check scan status and retrieve results
- Access HTTP/HTTPS traffic captured by Burp Proxy
- View site structure discovered during scanning
use cases of Burpsuite MCP Server?
- Automating web security assessments for applications.
- Integrating with AI assistants for real-time vulnerability analysis.
- Monitoring and analyzing HTTP traffic for security insights.
FAQ from Burpsuite MCP Server?
- What types of scans can I perform?
You can perform passive, active, or full scans on target URLs.
- How do I check the status of a scan?
Use the
get_scan_status
command with the scan ID to check its status.
- Can I filter scan issues by severity?
Yes, you can filter issues by severity levels such as high, medium, low, info, or all.
Burpsuite MCP Server
A Model Context Protocol (MCP) server that provides an interface for interacting with Burpsuite Professional's scanning and proxy functionality.
Overview
This MCP server allows AI assistants to interact with Burpsuite Professional for web security testing and vulnerability scanning. It provides tools for:
- Starting vulnerability scans on target URLs
- Checking scan status and retrieving results
- Accessing HTTP/HTTPS traffic captured by Burp Proxy
- Viewing site structure discovered during scanning
Features
Tools
The server exposes the following tools:
-
start_scan: Start a new vulnerability scan on a target URL
- Parameters:
target
: Target URL to scan (e.g., https://example.com)scan_type
: Type of scan to perform (passive, active, or full)
- Parameters:
-
get_scan_status: Check the status of a running scan
- Parameters:
scan_id
: ID of the scan to check
- Parameters:
-
get_scan_issues: Get vulnerability issues found in a scan
- Parameters:
scan_id
: ID of the scanseverity
: Filter issues by severity (high, medium, low, info, or all)
- Parameters:
-
get_proxy_history: Get HTTP/HTTPS traffic captured by Burp Proxy
- Parameters:
host
: Filter by host (optional)method
: Filter by HTTP method (optional)status_code
: Filter by HTTP status code (optional)limit
: Maximum number of items to return (default: 10)
- Parameters:
-
get_site_map: Get the site structure discovered during scanning and browsing
- Parameters:
host
: Filter by host (optional)with_parameters
: Only show URLs with parameters (optional)limit
: Maximum number of items to return (default: 20)
- Parameters:
Resources
The server provides the following resources:
- Scan Results:
burpsuite://scan/{scanId}
- Issue Details:
burpsuite://scan/{scanId}/issue/{issueId}
- Proxy History:
burpsuite://proxy/history
- Proxy History Item:
burpsuite://proxy/history/{itemId}
- Site Map:
burpsuite://sitemap
Installation
-
Build the server:
cd /path/to/burpsuite-server npm install npm run build
-
Add the server to your MCP settings configuration file:
{ "mcpServers": { "burpsuite": { "command": "node", "args": ["/path/to/burpsuite-server/build/index.js"], "env": {}, "disabled": false, "autoApprove": [] } } }
Future Enhancements
This server currently provides mock functionality. To connect it to a real Burpsuite Professional instance:
- Configure Burpsuite Professional to expose its REST API
- Update the server implementation to connect to the Burpsuite REST API
- Add authentication mechanisms for secure API communication
Example Usage
Here are some examples of how to use the Burpsuite MCP server with an AI assistant:
Starting a Scan
Use the Burpsuite MCP server to scan example.com for vulnerabilities.
Viewing Proxy History
Show me the HTTP traffic captured by Burp Proxy for domain example.com.
Analyzing Vulnerabilities
What high severity vulnerabilities were found in the latest scan?