Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0491: The prompt parsing in bash allows a local user to execute commands as another user by creating a dir

0
Medium
VulnerabilityCVE-1999-0491cve-1999-0491cwe-94
Published: Tue Apr 20 1999 (04/20/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: gnu
Product: bash

Description

The prompt parsing in bash allows a local user to execute commands as another user by creating a directory with the name of the command to execute.

AI-Powered Analysis

AILast updated: 07/01/2025, 18:26:45 UTC

Technical Analysis

CVE-1999-0491 is a medium-severity vulnerability affecting multiple early versions of the GNU Bash shell, specifically versions 1.14.0 through 1.14.7 and 2.0 through 2.05. The vulnerability arises from the way Bash parses the command prompt string (PS1). In these affected versions, a local user can exploit the prompt parsing mechanism by creating a directory named after a command they wish to execute. When Bash processes the prompt, it inadvertently executes commands embedded in directory names, allowing the attacker to run arbitrary commands with the privileges of another user. This vulnerability is a form of code injection related to CWE-94 (Improper Control of Generation of Code). The attack requires local access and does not require authentication, but it does require the attacker to have the ability to create directories in a location that influences the prompt parsing of the target user. There is no patch available for this vulnerability, and no known exploits have been reported in the wild. The CVSS v2 score is 4.6, reflecting a medium severity with local attack vector, low attack complexity, no authentication required, and partial impact on confidentiality, integrity, and availability.

Potential Impact

For European organizations, the impact of this vulnerability is primarily on systems running legacy versions of Bash, which are now very old and generally replaced in modern environments. However, in environments where legacy Unix/Linux systems are still in use, this vulnerability could allow a local attacker to escalate privileges or execute arbitrary commands as another user, potentially leading to unauthorized access to sensitive data, system compromise, or disruption of services. The vulnerability affects confidentiality, integrity, and availability to a partial extent. Although exploitation requires local access, insider threats or attackers who have gained limited access could leverage this flaw to expand their control. Given the age of the vulnerability and lack of patches, organizations relying on legacy systems without updates are at risk. For modern European enterprises, the direct risk is low, but legacy industrial control systems, embedded devices, or specialized environments might still be vulnerable.

Mitigation Recommendations

Since no official patch is available for the affected Bash versions, European organizations should prioritize upgrading to a modern, supported version of Bash where this vulnerability has been addressed. For legacy systems where upgrading is not immediately feasible, organizations should restrict local user permissions to prevent unauthorized directory creation in locations that influence prompt parsing. Implement strict access controls and monitoring on systems with legacy Bash versions to detect suspicious directory creation or command execution patterns. Employ application whitelisting and intrusion detection systems to identify anomalous behavior indicative of exploitation attempts. Additionally, consider isolating legacy systems from critical networks and limiting local user access to trusted personnel only. Regular audits of system configurations and user permissions can help reduce the attack surface. Finally, organizations should maintain comprehensive logging to facilitate forensic analysis in case of suspected exploitation.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32cb6fd31d6ed7def84

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 6:26:45 PM

Last updated: 2/7/2026, 5:14:13 PM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats