CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
61.4%
autoload/netrw.vim (aka the Netrw Plugin) 109, 131, and other versions before 133k for Vim 7.1.266, other 7.1 versions, and 7.2 stores credentials for an FTP session, and sends those credentials when attempting to establish subsequent FTP sessions to servers on different hosts, which allows remote FTP servers to obtain sensitive information in opportunistic circumstances by logging usernames and passwords. NOTE: the upstream vendor disputes a vector involving different ports on the same host, stating “I’m assuming that they’re using the same id and password on that unchanged hostname, deliberately.”
Vendor | Product | Version | CPE |
---|---|---|---|
vim | vim | 7.1 | cpe:2.3:a:vim:vim:7.1:*:*:*:*:*:*:* |
vim | vim | 7.1.266 | cpe:2.3:a:vim:vim:7.1.266:*:*:*:*:*:*:* |
vim | vim | 7.2 | cpe:2.3:a:vim:vim:7.2:*:*:*:*:*:*:* |
vim | netrw | 109 | cpe:2.3:a:vim:netrw:109:*:*:*:*:*:*:* |
vim | netrw | 110 | cpe:2.3:a:vim:netrw:110:*:*:*:*:*:*:* |
vim | netrw | 111 | cpe:2.3:a:vim:netrw:111:*:*:*:*:*:*:* |
vim | netrw | 112 | cpe:2.3:a:vim:netrw:112:*:*:*:*:*:*:* |
vim | netrw | 113 | cpe:2.3:a:vim:netrw:113:*:*:*:*:*:*:* |
vim | netrw | 114 | cpe:2.3:a:vim:netrw:114:*:*:*:*:*:*:* |
vim | netrw | 115 | cpe:2.3:a:vim:netrw:115:*:*:*:*:*:*:* |
groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6
lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
secunia.com/advisories/31464
secunia.com/advisories/34418
www.mandriva.com/security/advisories?name=MDVSA-2008:236
www.openwall.com/lists/oss-security/2008/10/06/4
www.openwall.com/lists/oss-security/2008/10/16/2
www.openwall.com/lists/oss-security/2008/10/20/2
www.rdancer.org/vulnerablevim-netrw-credentials-dis.html
www.securityfocus.com/archive/1/495432
www.securityfocus.com/archive/1/495436
www.securityfocus.com/bid/30670
www.vupen.com/english/advisories/2008/2379
bugzilla.redhat.com/show_bug.cgi?id=461750
exchange.xforce.ibmcloud.com/vulnerabilities/44419