CVE-2024-41815

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-41815
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-41815.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-41815
Aliases
Published
2024-07-26T21:01:48Z
Modified
2025-10-22T18:42:59.782430Z
Severity
  • 7.4 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Starship vulnerable to shell injection via undocumented, unpredictable shell expansion in custom commands
Details

Starship is a cross-shell prompt. Starting in version 1.0.0 and prior to version 1.20.0, undocumented and unpredictable shell expansion and/or quoting rules make it easily to accidentally cause shell injection when using custom commands with starship in bash. This issue only affects users with custom commands, so the scope is limited, and without knowledge of others' commands, it could be hard to successfully target someone. Version 1.20.0 fixes the vulnerability.

Database specific
{
    "cwe_ids": [
        "CWE-77"
    ]
}
References

Affected packages

Git / github.com/starship/starship

Affected ranges

Type
GIT
Repo
https://github.com/starship/starship
Events

Affected versions

v1.*

v1.0.0
v1.1.0
v1.1.1
v1.10.0
v1.10.1
v1.10.2
v1.10.3
v1.11.0
v1.12.0
v1.13.0
v1.13.1
v1.14.0
v1.14.1
v1.14.2
v1.15.0
v1.16.0
v1.17.0
v1.17.1
v1.18.0
v1.18.1
v1.18.2
v1.19.0
v1.2.0
v1.2.1
v1.3.0
v1.4.0
v1.4.1
v1.4.2
v1.5.2
v1.5.3
v1.5.4
v1.6.0
v1.6.1
v1.6.2
v1.6.3
v1.7.0
v1.7.1
v1.8.0
v1.9.0
v1.9.1