In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2022/May/33 | Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2022/May/35 | Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2022/May/38 | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/02/msg00020.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2P3LPMGENEHKDWFO4MWMZSZL6G7Y4CV7/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BWF3EXNBX5SVFDBL4ZFOD4GJBWFUKWN4/ | |
https://support.apple.com/kb/HT213255 | Third Party Advisory |
https://support.apple.com/kb/HT213256 | Third Party Advisory |
https://support.apple.com/kb/HT213257 | Third Party Advisory |
https://vuln.ryotak.me/advisories/63 | Third Party Advisory |
https://www.debian.org/security/2022/dsa-5078 | Third Party Advisory |
https://zsh.sourceforge.io/releases.html | Release Notes Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
17 May 2022, 07:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 May 2022, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Mar 2022, 16:08
Type | Values Removed | Values Added |
---|---|---|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWF3EXNBX5SVFDBL4ZFOD4GJBWFUKWN4/ - Mailing List, Third Party Advisory | |
CPE | cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* |
24 Feb 2022, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
23 Feb 2022, 20:16
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.1
v3 : 7.8 |
22 Feb 2022, 18:31
Type | Values Removed | Values Added |
---|---|---|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P3LPMGENEHKDWFO4MWMZSZL6G7Y4CV7/ - Mailing List, Third Party Advisory | |
References | (MISC) https://vuln.ryotak.me/advisories/63 - Third Party Advisory | |
References | (DEBIAN) https://www.debian.org/security/2022/dsa-5078 - Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2022/02/msg00020.html - Mailing List, Third Party Advisory | |
References | (MISC) https://zsh.sourceforge.io/releases.html - Release Notes, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : 8.8 |
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:a:zsh:zsh:*:*:*:*:*:*:*:* |
18 Feb 2022, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Feb 2022, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Feb 2022, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
14 Feb 2022, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-02-14 12:15
Updated : 2024-02-04 22:29
NVD link : CVE-2021-45444
Mitre link : CVE-2021-45444
CVE.ORG link : CVE-2021-45444
JSON object : View
Products Affected
apple
- macos
- mac_os_x
debian
- debian_linux
fedoraproject
- fedora
zsh
- zsh
CWE