CVE-2021-45444

Name
CVE-2021-45444
Description
In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://zsh.sourceforge.io/releases.html
MISC https://vuln.ryotak.me/advisories/63
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P3LPMGENEHKDWFO4MWMZSZL6G7Y4CV7/
DEBIAN https://www.debian.org/security/2022/dsa-5078
MLIST https://lists.debian.org/debian-lts-announce/2022/02/msg00020.html
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWF3EXNBX5SVFDBL4ZFOD4GJBWFUKWN4/
CONFIRM https://support.apple.com/kb/HT213255
CONFIRM https://support.apple.com/kb/HT213256
CONFIRM https://support.apple.com/kb/HT213257
FULLDISC http://seclists.org/fulldisclosure/2022/May/33
FULLDISC http://seclists.org/fulldisclosure/2022/May/35
FULLDISC http://seclists.org/fulldisclosure/2022/May/38

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:zsh:zsh:*:*:*:*:*:*:*:* zsh >= None < 5.8.1

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
zsh 3.15-main 5.8.1-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
zsh 3.14-main 5.8.1-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
zsh 3.13-main 5.8.1-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
zsh 3.12-main 5.8.1-r0 Natanael Copa <ncopa@alpinelinux.org> fixed