2021-12-21 05:01:28 +00:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
2022-02-13 06:01:07 +00:00
"ID" : "CVE-2021-45444" ,
"STATE" : "PUBLIC"
2021-12-21 05:01:28 +00:00
} ,
2022-02-13 06:01:07 +00:00
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
2021-12-21 05:01:28 +00:00
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2022-02-13 06:01:07 +00:00
"value" : "In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"url" : "https://zsh.sourceforge.io/releases.html" ,
"refsource" : "MISC" ,
"name" : "https://zsh.sourceforge.io/releases.html"
} ,
{
"refsource" : "MISC" ,
"name" : "https://vuln.ryotak.me/advisories/63" ,
"url" : "https://vuln.ryotak.me/advisories/63"
2022-02-16 04:01:07 +00:00
} ,
{
"refsource" : "FEDORA" ,
"name" : "FEDORA-2022-adf0c6d196" ,
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P3LPMGENEHKDWFO4MWMZSZL6G7Y4CV7/"
2022-02-16 20:01:17 +00:00
} ,
{
"refsource" : "DEBIAN" ,
"name" : "DSA-5078" ,
"url" : "https://www.debian.org/security/2022/dsa-5078"
2022-02-18 11:01:08 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[debian-lts-announce] 20220218 [SECURITY] [DLA 2926-1] zsh security update" ,
"url" : "https://lists.debian.org/debian-lts-announce/2022/02/msg00020.html"
2022-02-24 15:02:06 +00:00
} ,
{
"refsource" : "FEDORA" ,
"name" : "FEDORA-2022-0a06987c3c" ,
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWF3EXNBX5SVFDBL4ZFOD4GJBWFUKWN4/"
2022-05-16 20:01:40 +00:00
} ,
{
"refsource" : "CONFIRM" ,
"name" : "https://support.apple.com/kb/HT213257" ,
"url" : "https://support.apple.com/kb/HT213257"
2022-05-16 21:02:00 +00:00
} ,
{
"refsource" : "CONFIRM" ,
"name" : "https://support.apple.com/kb/HT213256" ,
"url" : "https://support.apple.com/kb/HT213256"
} ,
{
"refsource" : "CONFIRM" ,
"name" : "https://support.apple.com/kb/HT213255" ,
"url" : "https://support.apple.com/kb/HT213255"
2022-05-17 07:01:27 +00:00
} ,
{
"refsource" : "FULLDISC" ,
"name" : "20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina" ,
"url" : "http://seclists.org/fulldisclosure/2022/May/33"
2022-05-17 07:01:53 +00:00
} ,
{
"refsource" : "FULLDISC" ,
"name" : "20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6" ,
"url" : "http://seclists.org/fulldisclosure/2022/May/35"
} ,
{
"refsource" : "FULLDISC" ,
"name" : "20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4" ,
"url" : "http://seclists.org/fulldisclosure/2022/May/38"
2021-12-21 05:01:28 +00:00
}
]
}
}