Eval Injection Affecting zsh-html package, versions *


Severity

Recommended
low

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.04% (5th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Eval Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RHEL7-ZSHHTML-1327000
  • published26 Jul 2021
  • disclosed26 Feb 2018

Introduced: 26 Feb 2018

CVE-2014-10070  (opens in a new tab)
CWE-95  (opens in a new tab)

How to fix?

There is no fixed version for RHEL:7 zsh-html.

NVD Description

Note: Versions mentioned in the description apply only to the upstream zsh-html package and not the zsh-html package as distributed by RHEL. See How to fix? for RHEL:7 relevant fixed versions and status.

zsh before 5.0.7 allows evaluation of the initial values of integer variables imported from the environment (instead of treating them as literal numbers). That could allow local privilege escalation, under some specific and atypical conditions where zsh is being invoked in privilege-elevation contexts when the environment has not been properly sanitized, such as when zsh is invoked by sudo on systems where "env_reset" has been disabled.