#VU31049 OS Command Injection in Vim - CVE-2019-12735

 

#VU31049 OS Command Injection in Vim - CVE-2019-12735

Published: June 5, 2019 / Updated: June 17, 2021


Vulnerability identifier: #VU31049
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear
CVE-ID: CVE-2019-12735
CWE-ID: CWE-78
Exploitation vector: Local access
Exploit availability: Public exploit is available
Vulnerable software:
Vim
Software vendor:
Vim.org

Description

The vulnerability allows a local non-authenticated attacker to execute arbitrary code.

getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.


Remediation

Install update from vendor's website.

External links