Описание
In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 5.4.2-3ubuntu3.2 |
devel | not-affected | 5.8.1-1 |
esm-infra/bionic | not-affected | 5.4.2-3ubuntu3.2 |
esm-infra/focal | not-affected | 5.8-3ubuntu1.1 |
esm-infra/xenial | released | 5.1.1-1ubuntu2.3+esm1 |
focal | released | 5.8-3ubuntu1.1 |
impish | released | 5.8-6ubuntu0.1 |
jammy | needs-triage | |
kinetic | not-affected | 5.8.1-1 |
lunar | not-affected | 5.8.1-1 |
Показывать по
Ссылки на источники
5.1 Medium
CVSS2
7.8 High
CVSS3
Связанные уязвимости
In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
In zsh before 5.8.1, an attacker can achieve code execution if they co ...
5.1 Medium
CVSS2
7.8 High
CVSS3