vendor:
Vim Text Editor
by:
str0ke
7,5
CVSS
HIGH
Command Execution
78
CWE
Product Name: Vim Text Editor
Affected Version From: Vim 5.x
Affected Version To: Vim 7.x
Patch Exists: No
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: All
2005
Vim Fold Expression Command Execution Vulnerability
This vulnerability allows an attacker to execute arbitrary commands when a user opens a text file with Vim. The attacker can insert a malicious fold expression at the top of the file, which will be executed when the file is opened. This can be used to gain access to the system, as the command can be used to change the permissions of a file, such as /etc/shadow.
Mitigation:
Disable the 'modeline' option in Vim, or use a different text editor.