Improper input validation in Bash - CVE-2016-0634
Published: May 28, 2018 / Updated: May 31, 2018
Bash
Detailed vulnerability description
The vulnerability allows a remote authenticated attacker to execute arbitrary code on the target system.
The vulnerability exists in the expansion of 'h' in the prompt string due to insufficient validation of user-supplied input. A remote attacker can place shell metacharacters in 'hostname' of a machine and execute arbitrary code with elevated privileges.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.