Home » News » Vulnerability in Vim and Neovim editors leads to code execution while opening a malicious file

Vulnerability in Vim and Neovim editors leads to code execution while opening a malicious file

In text editors Vim and Neovim was found a vulnerability (CVE-2019-12735), which allows to execute arbitrary code while opening a specially designed file.

The problem manifests itself with the activity of the modeline enabled by default (“: set modeline“), which allows defining editing options in the file being processed. Vulnerability eliminated in Vim 8.1.1365 and Neovim 0.3.6 releases.

Through modeline, allowed only a limited number of options. If expression is specified as an option value, it is executed in the sandbox mode, which allows using only the simplest safe operations.

At the same time, the “: source” command is and in it can be used “!” Modifier to run arbitrary commands from specified file. Thus, to execute the code, it is sufficient to indicate in the modeline line a construction of the form “set foldexpr = execute (‘\: source! Some_file’):“. In Neovim, execute call is forbidden, but assert_fails can be used instead.

For example, to execute “uname -a” command, simply open a file in Vim or Neovim, the first or last line of which says:

:!uname -a||" vi:fen:fdm=expr:fde=assert_fails("source\!\ \%"):fdl=0:fdt="

The “source!%” comand will read commands from the current file and, accordingly, execute “:! Uname -a“. To hide this line from output by the cat utility, can be used escape sequences.

For example, in this prototype of an exploit during operation of a file in vim, created network connection with shell access to victim’s system, but this file will not cause suspicion when outputting to the terminal with the cat utility.

READ  Microsoft IE11 vulnerability is more dangerous than it seemed as browser Edge is also sensitive to it

You can check the modeline activity using the “: set modeline?” Command. To disable vimrc, you can add the line “set nomodeline“. In distributions, the problem is fixed in RHEL, SUSE/openSUSE, Fedora, FreeBSD, Ubuntu, Arch Linux and ALT. Vulnerability remains uncorrected in Debian.

Source: https://nvd.nist.gov

[Total: 0    Average: 0/5]

About Trojan Killer

Carry Trojan Killer Portable on your memory stick. Be sure that you’re able to help your PC resist any cyber threats wherever you go.

Check Also

Hacking tournament Pwn2Own Tokyo

Participants of the hacking tournament Pwn2Own Tokyo 2019 hacked Samsung Galaxy S10, Xiaomi Mi9, Amazon Echo and not only

The hacking tournament Pwn2Own Tokyo 2019, traditionally held as part of the PacSec conference and …

Vulnerability in Libarchive Threatens Linux

Vulnerability in Libarchive Threatens Many Linux Distributions

In the summer this year, Google experts, using the ClusterFuzz and OSS-Fuzz tools, discovered a …

Leave a Reply