Lucene search

K
freebsdFreeBSDD923FB0C-8C2F-11EC-AA85-0800270512F4
HistoryFeb 12, 2022 - 12:00 a.m.

zsh -- Arbitrary command execution vulnerability

2022-02-1200:00:00
vuxml.freebsd.org
10

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

5.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

37.6%

Marc Cornellà reports:

    Some prompt expansion sequences, such as %F, support 'arguments'
    which are themselves expanded in case they contain colour values,
    etc. This additional expansion would trigger PROMPT_SUBST evaluation,
    if enabled. This could be abused to execute code the user didn't
    expect. e.g., given a certain prompt configuration, an attacker
    could trick a user into executing arbitrary code by having them
    check out a Git branch with a specially crafted name.
OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchzsh< 5.8.1UNKNOWN

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

5.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

37.6%