
CVE-2023-49284 – Command substitution output can trigger shell expansion in fish shell
https://notcve.org/view.php?id=CVE-2023-49284
04 Dec 2023 — fish is a smart and user-friendly command line shell for macOS, Linux, and the rest of the family. fish shell uses certain Unicode non-characters internally for marking wildcards and expansions. It will incorrectly allow these markers to be read on command substitution output, rather than transforming them into a safe internal representation. While this may cause unexpected behavior with direct input (for example, echo \UFDD2HOME has the same output as echo $HOME), this may become a minor security problem i... • http://www.openwall.com/lists/oss-security/2023/12/08/1 • CWE-436: Interpretation Conflict •

CVE-2022-20001 – Injection in fish
https://notcve.org/view.php?id=CVE-2022-20001
14 Mar 2022 — fish is a command line shell. fish version 3.1.0 through version 3.3.1 is vulnerable to arbitrary code execution. git repositories can contain per-repository configuration that change the behavior of git, including running arbitrary commands. When using the default configuration of fish, changing to a directory automatically runs `git` commands in order to display information about the current repository in the prompt. If an attacker can convince a user to change their current directory into one controlled ... • https://github.com/fish-shell/fish-shell/pull/8589 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-427: Uncontrolled Search Path Element •

CVE-2014-3856
https://notcve.org/view.php?id=CVE-2014-3856
28 Jan 2020 — The funced function in fish (aka fish-shell) 1.23.0 before 2.1.1 does not properly create temporary files, which allows local users to gain privileges via a temporary file with a predictable name. La función funced de fish (también se conoce como fish-shell) versiones 1.23.0 anteriores a 2.1.1, no crea apropiadamente archivos temporales, lo que permite a usuarios locales alcanzar privilegios por medio de un archivo temporal con un nombre predecible. • https://github.com/fish-shell/fish-shell/issues/1437 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVE-2014-2906 – Gentoo Linux Security Advisory 201412-49
https://notcve.org/view.php?id=CVE-2014-2906
29 Dec 2014 — The psub function in fish (aka fish-shell) 1.16.0 before 2.1.1 does not properly create temporary files, which allows local users to execute arbitrary commands via a temporary file with a predictable name. La función psub en fish (también se conoce como fish-shell) versiones 1.16.0 anteriores a 2.1.1, no crea apropiadamente archivos temporales, lo que permite a usuarios locales ejecutar comandos arbitrarios por medio de un archivo temporal con un nombre predecible. Multiple vulnerabilities have been found i... • http://www.openwall.com/lists/oss-security/2014/04/28/4 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVE-2014-2914 – Gentoo Linux Security Advisory 201412-49
https://notcve.org/view.php?id=CVE-2014-2914
29 Dec 2014 — fish (aka fish-shell) 2.0.0 before 2.1.1 does not restrict access to the configuration service (aka fish_config), which allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by set_prompt. fish (también se conoce como fish-shell) versiones 2.0.0 anteriores a 2.1.1, no restringe el acceso al servicio de configuración (también se conoce como fish_config), lo que permite a atacantes remotos ejecutar código arbitrario por medio de vectores no especificados, como es demostrad... • http://www.openwall.com/lists/oss-security/2014/04/28/4 • CWE-20: Improper Input Validation •

CVE-2014-3219 – Gentoo Linux Security Advisory 201412-49
https://notcve.org/view.php?id=CVE-2014-3219
29 Dec 2014 — fish before 2.1.1 allows local users to write to arbitrary files via a symlink attack on (1) /tmp/fishd.log.%s, (2) /tmp/.pac-cache.$USER, (3) /tmp/.yum-cache.$USER, or (4) /tmp/.rpm-cache.$USER. fish, en versiones anteriores a la 2.1.1, permite que usuarios locales escriban en archivos arbitrarios mediante un ataque de vínculo simbólico en (1) /tmp/fishd.log. • http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132751.html • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2014-2905 – Gentoo Linux Security Advisory 201412-49
https://notcve.org/view.php?id=CVE-2014-2905
02 May 2014 — fish (aka fish-shell) 1.16.0 before 2.1.1 does not properly check the credentials, which allows local users to gain privileges via the universal variable socket, related to /tmp/fishd.socket.user permissions. fish (también conocido como fish-shell) 1.16.0 anterior a 2.1.1 no comprueba debidamente los credenciales, lo que permite a usuarios locales ganar privilegios a través del socket de variable universal, relacionado con permisos /tmp/fishd.socket.user. Multiple vulnerabilities have been found in fish, th... • http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00059.html • CWE-264: Permissions, Privileges, and Access Controls •