提出 #798525: tufantunc ssh-mcp 1.5 Information Exposure Through Server Log Files情報

タイトルtufantunc ssh-mcp 1.5 Information Exposure Through Server Log Files
説明A local information exposure issue exists in ssh-mcp where SSH credentials are accepted via command-line (it is the only way to pass credentials) options (--password, --sudoPassword, --suPassword). Because process arguments are readable by unprivileged local users (via ps or /proc/<pid>/cmdline on Linux, even low privilege), any attacker on the same host can directly recover plaintext passwords from the running process command-line string. This leads to credential leakage and violates secure handling of sensitive secrets in service startup parameters.
ソース⚠️ https://github.com/tufantunc/ssh-mcp/issues/42
ユーザー
 BlackBird_BB (UID 96773)
送信2026年04月07日 05:35 (21 日 ago)
モデレーション2026年04月25日 17:46 (19 days later)
ステータス承諾済み
VulDBエントリ359618 [tufantunc ssh-mcp 迄 1.5.0 Command Line src/index.ts 情報漏えい]
ポイント20

Want to know what is going to be exploited?

We predict KEV entries!