In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2022-02-14 04:15
Updated : 2022-09-29 19:37
NVD link : CVE-2021-45444
Mitre link : CVE-2021-45444
JSON object : View
CWE
Products Affected
apple
- macos
- mac_os_x
zsh
- zsh
fedoraproject
- fedora
debian
- debian_linux