Lucene search

K
cvelist@huntrdevCVELIST:CVE-2021-3726
HistoryNov 30, 2021 - 9:30 a.m.

CVE-2021-3726 OS Command Injection in ohmyzsh/ohmyzsh

2021-11-3009:30:15
CWE-78
@huntrdev
www.cve.org
2
command injection
ohmyzsh
security
vulnerability
fixed

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.002

Percentile

61.2%

Vulnerability in title function Description: the title function defined in lib/termsupport.zsh uses print to set the terminal title to a user-supplied string. In Oh My Zsh, this function is always used securely, but custom user code could use the title function in a way that is unsafe.Fixed in: a263cdac.Impacted areas: - title function in lib/termsupport.zsh. - Custom user code using the title function.

CNA Affected

[
  {
    "product": "ohmyzsh/ohmyzsh",
    "vendor": "ohmyzsh",
    "versions": [
      {
        "lessThan": "a263cdac",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

9.5

Confidence

High

EPSS

0.002

Percentile

61.2%

Related for CVELIST:CVE-2021-3726