Arbitrary OS Command Execution via Modeline in Vim and Neovim

Arbitrary OS Command Execution via Modeline in Vim and Neovim

CVE-2019-12735 · HIGH Severity

AV:N/AC:M/AU:N/C:C/I:C/A:C

getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.

Learn more about our Web Application Penetration Testing UK.