Privilege Escalation in Zsh via MODULE_PATH and zmodload

Privilege Escalation in Zsh via MODULE_PATH and zmodload

CVE-2019-20044 · HIGH Severity

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

In Zsh before 5.8, attackers able to execute commands can regain privileges dropped by the --no-PRIVILEGED option. Zsh fails to overwrite the saved uid, so the original privileges can be restored by executing MODULE_PATH=/dir/with/module zmodload with a module that calls setuid().

Learn more about our Web Application Penetration Testing UK.