1 results (0.001 seconds)

CVSS: 9.8EPSS: 5%CPEs: 17EXPL: 2

21 Feb 2009 — The shellescape function in Vim 7.0 through 7.2, including 7.2a.10, allows user-assisted attackers to execute arbitrary code via the "!" (exclamation point) shell metacharacter in (1) the filename of a ZIP archive and possibly (2) the filename of the first file in a ZIP archive, which is not properly handled by zip.vim in the VIM ZIP plugin (zipPlugin.vim) v.11 through v.21, as demonstrated by the zipplugin and zipplugin.v2 test cases. NOTE: this issue reportedly exists because of an incomplete fix for CVE-... • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506919 • CWE-94: Improper Control of Generation of Code ('Code Injection') •