In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
{
"unresolved_ranges": [
{
"cpes": [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:*"
],
"extracted_events": [
{
"introduced": "10.15"
},
{
"fixed": "10.15.7"
},
{
"last_affected": "10.15.7-security_update_2020"
},
{
"last_affected": "10.15.7-security_update_2020\\-001"
},
{
"last_affected": "10.15.7-security_update_2020\\-005"
},
{
"last_affected": "10.15.7-security_update_2020\\-007"
},
{
"last_affected": "10.15.7-security_update_2021\\-001"
},
{
"last_affected": "10.15.7-security_update_2021\\-002"
},
{
"last_affected": "10.15.7-security_update_2021\\-003"
},
{
"last_affected": "10.15.7-security_update_2021\\-006"
},
{
"last_affected": "10.15.7-security_update_2021\\-007"
},
{
"last_affected": "10.15.7-security_update_2021\\-008"
},
{
"last_affected": "10.15.7-security_update_2022\\-001"
},
{
"last_affected": "10.15.7-security_update_2022\\-002"
},
{
"last_affected": "10.15.7-security_update_2022\\-003"
}
],
"source": "CPE_FIELD",
"vendor_product": "apple:mac_os_x"
},
{
"cpes": [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"introduced": "11.0"
},
{
"fixed": "11.6.6"
},
{
"introduced": "12.0.0"
},
{
"fixed": "12.4"
}
],
"source": "CPE_FIELD",
"vendor_product": "apple:macos"
},
{
"cpes": [
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "9.0"
},
{
"last_affected": "10.0"
},
{
"last_affected": "11.0"
}
],
"source": "CPE_FIELD",
"vendor_product": "debian:debian_linux"
},
{
"cpes": [
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "34"
},
{
"last_affected": "35"
}
],
"source": "CPE_FIELD",
"vendor_product": "fedoraproject:fedora"
}
]
}