Описание
In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 5.4.2-3ubuntu3.2 |
| devel | not-affected | 5.8.1-1 |
| esm-infra/bionic | released | 5.4.2-3ubuntu3.2 |
| esm-infra/focal | released | 5.8-3ubuntu1.1 |
| esm-infra/xenial | released | 5.1.1-1ubuntu2.3+esm1 |
| focal | released | 5.8-3ubuntu1.1 |
| impish | released | 5.8-6ubuntu0.1 |
| jammy | needs-triage | |
| kinetic | not-affected | 5.8.1-1 |
| lunar | not-affected | 5.8.1-1 |
Показывать по
Ссылки на источники
5.1 Medium
CVSS2
7.8 High
CVSS3
Связанные уязвимости
In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
In zsh before 5.8.1 an attacker can achieve code execution if they control a command output inside the prompt as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
In zsh before 5.8.1, an attacker can achieve code execution if they co ...
5.1 Medium
CVSS2
7.8 High
CVSS3