fish (aka fish-shell) 2.0.0 before 2.1.1 does not restrict access to the configuration service (aka fish_config), which allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by set_prompt.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2014/04/28/4 | Mailing List Third Party Advisory |
https://github.com/fish-shell/fish-shell/issues/1438 | Third Party Advisory |
http://www.openwall.com/lists/oss-security/2014/04/28/4 | Mailing List Third Party Advisory |
https://github.com/fish-shell/fish-shell/issues/1438 | Third Party Advisory |
Configurations
History
21 Nov 2024, 02:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2014/04/28/4 - Mailing List, Third Party Advisory | |
References | () https://github.com/fish-shell/fish-shell/issues/1438 - Third Party Advisory |
Information
Published : 2020-01-28 16:15
Updated : 2024-11-21 02:07
NVD link : CVE-2014-2914
Mitre link : CVE-2014-2914
CVE.ORG link : CVE-2014-2914
JSON object : View
Products Affected
fishshell
- fish
CWE
CWE-20
Improper Input Validation