Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2008-2712 — Improper Input Validation in Zipplugin.vim
Severity
9.3CRITICALNVD
EPSS
17.0%
top 5.01%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJun 16
Latest updateMay 2
Description
Vim 7.1.314, 6.4, and other versions allows user-assisted remote attackers to execute arbitrary commands via Vim scripts that do not properly sanitize inputs before invoking the execute or system functions, as demonstrated using (1) filetype.vim, (3) xpm.vim, (4) gzip_vim, and (5) netrw. NOTE: the originally reported version was 7.1.314, but the researcher actually found this set of issues in 7.1.298. NOTE: the zipplugin issue (originally vector 2 in this identifier) has been subsumed by CVE-200…
CVSS vector
AV:N/AC:M/C:C/I:C/A:CExploitability: 8.6 | Impact: 10.0
Affected Packages5 packages
Also affects: Ubuntu Linux 6.06, 7.10, 8.04, 8.10
🔴Vulnerability Details
10💥Exploits & PoCs
1📋Vendor Advisories
11Red Hat
▶
💬Community
4Bugzilla▶
CVE-2008-3075 Vim zip.vim plugin: improper Implementation of shellescape() (arbitrary code execution)↗2008-10-17
Bugzilla▶
CVE-2008-3074 Vim tar.vim plugin: improper Implementation of shellescape() (arbitrary code execution)↗2008-10-17
Bugzilla▶
CVE-2008-6235 Vim netrw.vim plugin: lack of sanitization throughout netrw.vim can lead to arbitrary code execution↗2008-10-17
Bugzilla▶
CVE-2008-2712 vim: command execution via scripts not sanitizing inputs to execute and system↗2008-06-17