Submeter #798528: tufantunc ssh-mcp 1.5 Command Injectioninformação

Títulotufantunc ssh-mcp 1.5 Command Injection
DescriçãoA command injection flaw exists in ssh-mcp when su mode is active and the description field is appended into shell input. description only escapes # but not line breaks, so a value like foo\nuseradd hacker is written into the root shell session (shell.write()), causing attacker-controlled commands to execute as root. This gives an adversary arbitrary root command execution through a seemingly innocuous metadata field and is a critical privilege escalation vector.
Fonte⚠️ https://github.com/tufantunc/ssh-mcp/issues/44
Utilizador
 BlackBird_BB (UID 96773)
Submissão07/04/2026 05h37 (há 20 dias)
Moderação25/04/2026 17h52 (19 days later)
EstadoAceite
Entrada VulDB359619 [tufantunc ssh-mcp até 1.5.0 src/index.ts shell.write Descrição Elevação de Privilégios]
Pontos20

Do you want to use VulDB in your project?

Use the official API to access entries easily!