| शीर्षक | tufantunc ssh-mcp 1.5 Information Exposure Through Server Log Files |
|---|
| विवरण | A local information exposure issue exists in ssh-mcp where SSH credentials are accepted via command-line (it is the only way to pass credentials) options (--password, --sudoPassword, --suPassword). Because process arguments are readable by unprivileged local users (via ps or /proc/<pid>/cmdline on Linux, even low privilege), any attacker on the same host can directly recover plaintext passwords from the running process command-line string. This leads to credential leakage and violates secure handling of sensitive secrets in service startup parameters. |
|---|
| स्रोत | ⚠️ https://github.com/tufantunc/ssh-mcp/issues/42 |
|---|
| उपयोगकर्ता | BlackBird_BB (UID 96773) |
|---|
| सबमिशन | 07/04/2026 05:35 AM (21 दिन पहले) |
|---|
| संयम | 25/04/2026 05:46 PM (19 days later) |
|---|
| स्थिति | स्वीकृत |
|---|
| VulDB प्रविष्टि | 359618 [tufantunc ssh-mcp तक 1.5.0 Command Line src/index.ts सूचना का प्रकटीकरण] |
|---|
| अंक | 20 |
|---|