2024-05-26 14:27:05 +02:00
### [CVE-2019-20044](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20044)



### Description
In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid().
### POC
#### Reference
- http://seclists.org/fulldisclosure/2020/May/53
2024-06-09 00:33:16 +00:00
- http://seclists.org/fulldisclosure/2020/May/53
2024-05-26 14:27:05 +02:00
- http://seclists.org/fulldisclosure/2020/May/55
2024-06-09 00:33:16 +00:00
- http://seclists.org/fulldisclosure/2020/May/55
2024-05-26 14:27:05 +02:00
- http://seclists.org/fulldisclosure/2020/May/59
2024-06-09 00:33:16 +00:00
- http://seclists.org/fulldisclosure/2020/May/59
2024-05-26 14:27:05 +02:00
#### Github
- https://github.com/MRXXII/zsh