CVE-2019-12735
Vim < 8.1.1365 / Neovim < 0.3.6 - Arbitrary Code Execution
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
7Exploited in Wild
-Decision
Descriptions
getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.
El archivo getchar.c en Vim anterior a versión 8.1.1365 y Neovim anterior a versión 0.3.6 permite a los atacantes remotos ejecutar comandos arbitrarios del sistema operativo por medio de: comando source! en el componente modeline, como es demostrado por la ejecución en Vim, y assert_fails o nvim_input en Neovim.
It was found that the `:source!` command was not restricted by the sandbox mode. If modeline was explicitly enabled, opening a specially crafted text file in vim could result in arbitrary command execution.
It was discovered that Vim incorrectly handled certain files. An attacker could possibly use this issue to execute arbitrary code. This issue only affected Ubuntu 16.04 LTS. It was discovered that Vim incorrectly handled certain files. An attacker could possibly use this issue to execute arbitrary code.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-06-04 First Exploit
- 2019-06-05 CVE Reserved
- 2019-06-05 CVE Published
- 2024-08-04 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
- CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
References (36)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/108724 | Vdb Entry | |
https://bugs.debian.org/930020 | Mailing List | |
https://bugs.debian.org/930024 | Mailing List | |
https://lists.debian.org/debian-lts-announce/2019/08/msg00003.html | Mailing List |
|
https://seclists.org/bugtraq/2019/Jul/39 | Mailing List |
|
https://seclists.org/bugtraq/2019/Jun/33 | Mailing List |
|
https://support.f5.com/csp/article/K93144355 | X_refsource_confirm | |
https://support.f5.com/csp/article/K93144355?utm_source=f5support&%3Butm_medium=RSS | X_refsource_confirm |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/46973 | 2019-06-04 | |
https://github.com/oldthree3/CVE-2019-12735-VIM-NEOVIM | 2019-06-19 | |
https://github.com/st9007a/CVE-2019-12735 | 2022-07-26 | |
https://github.com/datntsec/CVE-2019-12735 | 2020-10-27 | |
https://github.com/pcy190/ace-vim-neovim | 2024-08-12 | |
https://github.com/nickylimjj/cve-2019-12735 | 2021-08-04 | |
https://github.com/numirias/security/blob/master/doc/2019-06-04_ace-vim-neovim.md | 2024-08-04 |
URL | Date | SRC |
---|---|---|
https://github.com/neovim/neovim/pull/10082 | 2023-11-07 | |
https://github.com/vim/vim/commit/53575521406739cf20bbe4e384d88e7dca11f040 | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Vim Search vendor "Vim" | Vim Search vendor "Vim" for product "Vim" | < 8.1.1365 Search vendor "Vim" for product "Vim" and version " < 8.1.1365" | - |
Affected
| ||||||
Neovim Search vendor "Neovim" | Neovim Search vendor "Neovim" for product "Neovim" | < 0.3.6 Search vendor "Neovim" for product "Neovim" and version " < 0.3.6" | - |
Affected
|