提交 #798528: tufantunc ssh-mcp 1.5 Command Injection信息

标题tufantunc ssh-mcp 1.5 Command Injection
描述A command injection flaw exists in ssh-mcp when su mode is active and the description field is appended into shell input. description only escapes # but not line breaks, so a value like foo\nuseradd hacker is written into the root shell session (shell.write()), causing attacker-controlled commands to execute as root. This gives an adversary arbitrary root command execution through a seemingly innocuous metadata field and is a critical privilege escalation vector.
来源⚠️ https://github.com/tufantunc/ssh-mcp/issues/44
用户
 BlackBird_BB (UID 96773)
提交2026-04-07 05時37分 (20 日前)
管理2026-04-25 17時52分 (19 days later)
状态已接受
VulDB条目359619 [tufantunc ssh-mcp 直到 1.5.0 src/index.ts shell.write 描述 权限提升]
积分20

Interested in the pricing of exploits?

See the underground prices here!