Vulnerabilities
Vulnerable Software
Zsh:  >> Zsh  >> 5.5  Security Vulnerabilities
In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
CVSS Score
7.8
EPSS Score
0.001
Published
2022-02-14
In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid().
CVSS Score
7.8
EPSS Score
0.001
Published
2020-02-24
An issue was discovered in zsh before 5.6. The beginning of a #! script file was mishandled, potentially leading to an execve call to a program named on the second line.
CVSS Score
9.8
EPSS Score
0.008
Published
2018-09-05
An issue was discovered in zsh before 5.6. Shebang lines exceeding 64 characters were truncated, potentially leading to an execve call to a program name that is a substring of the intended one.
CVSS Score
9.8
EPSS Score
0.008
Published
2018-09-05


Contact Us

Shodan ® - All rights reserved