In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2022-02-13T05:32:21

Updated: 2022-05-17T06:08:11

Reserved: 2021-12-21T00:00:00


Link: CVE-2021-45444

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2022-02-14T12:15:15.750

Modified: 2023-11-07T03:39:50.397


Link: CVE-2021-45444

JSON object: View

cve-icon Redhat Information

No data.