提出 #798528: tufantunc ssh-mcp 1.5 Command Injection情報

タイトルtufantunc ssh-mcp 1.5 Command Injection
説明A command injection flaw exists in ssh-mcp when su mode is active and the description field is appended into shell input. description only escapes # but not line breaks, so a value like foo\nuseradd hacker is written into the root shell session (shell.write()), causing attacker-controlled commands to execute as root. This gives an adversary arbitrary root command execution through a seemingly innocuous metadata field and is a critical privilege escalation vector.
ソース⚠️ https://github.com/tufantunc/ssh-mcp/issues/44
ユーザー
 BlackBird_BB (UID 96773)
送信2026年04月07日 05:37 (20 日 ago)
モデレーション2026年04月25日 17:52 (19 days later)
ステータス承諾済み
VulDBエントリ359619 [tufantunc ssh-mcp 迄 1.5.0 src/index.ts shell.write 説明 特権昇格]
ポイント20

Might our Artificial Intelligence support you?

Check our Alexa App!