CVE Vulnerabilities

CVE-2021-45444

Published: Feb 14, 2022 | Modified: Nov 21, 2024
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS 2.x
5.1 MEDIUM
AV:N/AC:H/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
7.8 MODERATE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.

Affected Software

NameVendorStart VersionEnd Version
ZshZsh*5.8.1 (excluding)
Red Hat Enterprise Linux 8RedHatzsh-0:5.5.1-9.el8*
Red Hat Enterprise Linux 8RedHatzsh-0:5.5.1-9.el8*
ZshUbuntubionic*
ZshUbuntuesm-infra/bionic*
ZshUbuntuesm-infra/focal*
ZshUbuntuesm-infra/xenial*
ZshUbuntufocal*
ZshUbuntuimpish*
ZshUbuntutrusty*
ZshUbuntuupstream*
ZshUbuntuxenial*

References