In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Zsh | Zsh | * | 5.8.1 (excluding) |
| Red Hat Enterprise Linux 8 | RedHat | zsh-0:5.5.1-9.el8 | * |
| Red Hat Enterprise Linux 8 | RedHat | zsh-0:5.5.1-9.el8 | * |
| Zsh | Ubuntu | bionic | * |
| Zsh | Ubuntu | esm-infra/bionic | * |
| Zsh | Ubuntu | esm-infra/focal | * |
| Zsh | Ubuntu | esm-infra/xenial | * |
| Zsh | Ubuntu | focal | * |
| Zsh | Ubuntu | impish | * |
| Zsh | Ubuntu | trusty | * |
| Zsh | Ubuntu | upstream | * |
| Zsh | Ubuntu | xenial | * |