In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2022-02-14 12:15
Updated : 2024-11-21 06:32
NVD link : CVE-2021-45444
Mitre link : CVE-2021-45444
CVE.ORG link : CVE-2021-45444
JSON object : View
Products Affected
debian
- debian_linux
fedoraproject
- fedora
zsh
- zsh
apple
- macos
- mac_os_x
CWE