| शीर्षक | tufantunc ssh-mcp 1.5 Command Injection |
|---|
| विवरण | A command injection flaw exists in ssh-mcp when su mode is active and the description field is appended into shell input. description only escapes # but not line breaks, so a value like foo\nuseradd hacker is written into the root shell session (shell.write()), causing attacker-controlled commands to execute as root. This gives an adversary arbitrary root command execution through a seemingly innocuous metadata field and is a critical privilege escalation vector. |
|---|
| स्रोत | ⚠️ https://github.com/tufantunc/ssh-mcp/issues/44 |
|---|
| उपयोगकर्ता | BlackBird_BB (UID 96773) |
|---|
| सबमिशन | 07/04/2026 05:37 AM (20 दिन पहले) |
|---|
| संयम | 25/04/2026 05:52 PM (19 days later) |
|---|
| स्थिति | स्वीकृत |
|---|
| VulDB प्रविष्टि | 359619 [tufantunc ssh-mcp तक 1.5.0 src/index.ts shell.write विवरण अधिकार वृद्धि] |
|---|
| अंक | 20 |
|---|