Vulnerability CVE-2008-6235


Published: 2009-02-21   Modified: 2012-02-12

Description:
The Netrw plugin (netrw.vim) in Vim 7.0 and 7.1 allows user-assisted attackers to execute arbitrary commands via shell metacharacters in a filename used by the (1) "D" (delete) command or (2) b:netrw_curdir variable, as demonstrated using the netrw.v4 and netrw.v5 test cases.

Type:

CWE-78

(Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') )

CVSS2 => (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
9.3/10
10/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
VIM -> VIM 

 References:
http://www.rdancer.org/vulnerablevim-netrw.v2.html
http://www.rdancer.org/vulnerablevim-netrw.html
http://www.redhat.com/support/errata/RHSA-2008-0580.html
http://www.rdancer.org/vulnerablevim-netrw.v5.html
http://www.openwall.com/lists/oss-security/2008/10/20/2
http://www.openwall.com/lists/oss-security/2008/10/16/2
http://secunia.com/advisories/34418
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11247
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html

Copyright 2024, cxsecurity.com

 

Back to Top