Soumettre #798525: tufantunc ssh-mcp 1.5 Information Exposure Through Server Log Filesinformation

Titretufantunc ssh-mcp 1.5 Information Exposure Through Server Log Files
DescriptionA local information exposure issue exists in ssh-mcp where SSH credentials are accepted via command-line (it is the only way to pass credentials) options (--password, --sudoPassword, --suPassword). Because process arguments are readable by unprivileged local users (via ps or /proc/<pid>/cmdline on Linux, even low privilege), any attacker on the same host can directly recover plaintext passwords from the running process command-line string. This leads to credential leakage and violates secure handling of sensitive secrets in service startup parameters.
La source⚠️ https://github.com/tufantunc/ssh-mcp/issues/42
Utilisateur
 BlackBird_BB (UID 96773)
Soumission07/04/2026 05:35 (il y a 21 jours)
Modérer25/04/2026 17:46 (19 days later)
StatutAccepté
Entrée VulDB359618 [tufantunc ssh-mcp jusqu’à 1.5.0 Command Line src/index.ts divulgation d'information]
Points20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!