Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gwf9-995r-26hx

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.8

Описание

In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid().

In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid().

EPSS

Процентиль: 21%
0.00068
Низкий

7.8 High

CVSS3

Дефекты

CWE-273

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 6 лет назад

In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid().

CVSS3: 7.8
redhat
почти 6 лет назад

In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid().

CVSS3: 7.8
nvd
почти 6 лет назад

In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid().

CVSS3: 7.8
debian
почти 6 лет назад

In Zsh before 5.8, attackers able to execute commands can regain privi ...

rocky
больше 5 лет назад

Important: zsh security update

EPSS

Процентиль: 21%
0.00068
Низкий

7.8 High

CVSS3

Дефекты

CWE-273