In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Zsh | Zsh | * | 5.8.1 (excluding) |
Red Hat Enterprise Linux 8 | RedHat | zsh-0:5.5.1-9.el8 | * |
Red Hat Enterprise Linux 8 | RedHat | zsh-0:5.5.1-9.el8 | * |
Zsh | Ubuntu | bionic | * |
Zsh | Ubuntu | esm-infra/xenial | * |
Zsh | Ubuntu | focal | * |
Zsh | Ubuntu | impish | * |
Zsh | Ubuntu | trusty | * |
Zsh | Ubuntu | upstream | * |
Zsh | Ubuntu | xenial | * |