Bug 2253972 (CVE-2023-49284) - CVE-2023-49284 fish: command substitution output can trigger shell expansion
Summary: CVE-2023-49284 fish: command substitution output can trigger shell expansion
Keywords:
Status: NEW
Alias: CVE-2023-49284
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2253973 2253974
Blocks:
TreeView+ depends on / blocked
 
Reported: 2023-12-11 10:45 UTC by TEJ RATHI
Modified: 2023-12-11 10:45 UTC (History)
0 users

Fixed In Version: fish-shell 3.6.2
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description TEJ RATHI 2023-12-11 10:45:10 UTC
fish is a smart and user-friendly command line shell for macOS, Linux, and the rest of the family. fish shell uses certain Unicode non-characters internally for marking wildcards and expansions. It will incorrectly allow these markers to be read on command substitution output, rather than transforming them into a safe internal representation. While this may cause unexpected behavior with direct input (for example, echo \UFDD2HOME has the same output as echo $HOME), this may become a minor security problem if the output is being fed from an external program into a command substitution where this output may not be expected. This design flaw was introduced in very early versions of fish, predating the version control system, and is thought to be present in every version of fish released in the last 15 years or more, although with different characters. Code execution does not appear to be possible, but denial of service (through large brace expansion) or information disclosure (such as variable expansion) is potentially possible under certain circumstances. fish shell 3.6.2 has been released to correct this issue. Users are advised to upgrade. There are no known workarounds for this vulnerability.

http://www.openwall.com/lists/oss-security/2023/12/08/1
https://github.com/fish-shell/fish-shell/commit/09986f5563e31e2c900a606438f1d60d008f3a14
https://github.com/fish-shell/fish-shell/security/advisories/GHSA-2j9r-pm96-wp4f

Comment 1 TEJ RATHI 2023-12-11 10:45:33 UTC
Created fish tracking bugs for this issue:

Affects: epel-all [bug 2253974]
Affects: fedora-all [bug 2253973]


Note You need to log in before you can comment on or make changes to this bug.