Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-45444

Опубликовано: 14 фев. 2022
Источник: debian
EPSS Низкий

Описание

In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
zshfixed5.8.1-1package

Примечания

  • https://sourceforge.net/p/zsh/code/ci/c187154f47697cdbf822c2f9d714d570ed4a0fd1/

  • https://sourceforge.net/p/zsh/code/ci/fdb8b0ce6244ff26bf55e0fd825310a58d0d3156/

  • https://sourceforge.net/p/zsh/code/ci/bdc4d70a7e033b754e68a8659a037ea0fc5f38de/

EPSS

Процентиль: 27%
0.0009
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 3 лет назад

In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.

CVSS3: 7.8
redhat
больше 3 лет назад

In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.

CVSS3: 7.8
nvd
больше 3 лет назад

In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.

CVSS3: 7.8
msrc
больше 3 лет назад

Описание отсутствует

rocky
около 3 лет назад

Moderate: zsh security update

EPSS

Процентиль: 27%
0.0009
Низкий