In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2022/May/33 | Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2022/May/35 | Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2022/May/38 | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/02/msg00020.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2P3LPMGENEHKDWFO4MWMZSZL6G7Y4CV7/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BWF3EXNBX5SVFDBL4ZFOD4GJBWFUKWN4/ | |
https://support.apple.com/kb/HT213255 | Third Party Advisory |
https://support.apple.com/kb/HT213256 | Third Party Advisory |
https://support.apple.com/kb/HT213257 | Third Party Advisory |
https://vuln.ryotak.me/advisories/63 | Third Party Advisory |
https://www.debian.org/security/2022/dsa-5078 | Third Party Advisory |
https://zsh.sourceforge.io/releases.html | Release Notes Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
07 Nov 2023, 03:39
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2022-02-14 12:15
Updated : 2024-02-28 19:09
NVD link : CVE-2021-45444
Mitre link : CVE-2021-45444
CVE.ORG link : CVE-2021-45444
JSON object : View
Products Affected
debian
- debian_linux
apple
- mac_os_x
- macos
zsh
- zsh
fedoraproject
- fedora
CWE