In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Alpine | edge-main | noarch | zsh | <Â 5.8.1-r0 | UNKNOWN |
Alpine | 3.12-main | noarch | zsh | <Â 5.8.1-r0 | UNKNOWN |
Alpine | 3.13-main | noarch | zsh | <Â 5.8.1-r0 | UNKNOWN |
Alpine | 3.14-main | noarch | zsh | <Â 5.8.1-r0 | UNKNOWN |
Alpine | 3.15-main | noarch | zsh | <Â 5.8.1-r0 | UNKNOWN |
Alpine | 3.16-main | noarch | zsh | <Â 5.8.1-r0 | UNKNOWN |
Alpine | 3.17-main | noarch | zsh | <Â 5.8.1-r0 | UNKNOWN |
Alpine | 3.18-main | noarch | zsh | <Â 5.8.1-r0 | UNKNOWN |
Alpine | 3.19-main | noarch | zsh | <Â 5.8.1-r0 | UNKNOWN |