7.8
CVSSv3

CVE-2022-20001

Published: 14/03/2022 Updated: 07/11/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 606
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

fish is a command line shell. fish version 3.1.0 through version 3.3.1 is vulnerable to arbitrary code execution. git repositories can contain per-repository configuration that change the behavior of git, including running arbitrary commands. When using the default configuration of fish, changing to a directory automatically runs `git` commands in order to display information about the current repository in the prompt. If an attacker can convince a user to change their current directory into one controlled by the attacker, such as on a shared file system or extracted archive, fish will run arbitrary commands under the attacker's control. This problem has been fixed in fish 3.4.0. Note that running git in these directories, including using the git tab completion, remains a potential trigger for this issue. As a workaround, remove the `fish_git_prompt` function from the prompt.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

fishshell fish

fedoraproject fedora 35

fedoraproject fedora 36

debian debian linux 11.0

Vendor Advisories

An arbitrary code execution vulnerability was disovered in fish, a command line shell When using the default configuraton of fish, changing to a directory automatically ran `git` commands in order to display information about the current repository in the prompt Such repositories can contain per-repository configuration that change the behavior o ...
fish is a command line shell fish version 310 through version 331 is vulnerable to arbitrary code execution git repositories can contain per-repository configuration that change the behavior of git, including running arbitrary commands When using the default configuration of fish, changing to a directory automatically runs `git` commands in ...