Lucene search

K
cve[email protected]CVE-2008-6235
HistoryFeb 21, 2009 - 11:30 p.m.

CVE-2008-6235

2009-02-2123:30:00
CWE-78
web.nvd.nist.gov
22
vim
netrw plugin
cve-2008-6235
arbitrary command execution
shell metacharacters

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.8 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.0%

The Netrw plugin (netrw.vim) in Vim 7.0 and 7.1 allows user-assisted attackers to execute arbitrary commands via shell metacharacters in a filename used by the (1) “D” (delete) command or (2) b:netrw_curdir variable, as demonstrated using the netrw.v4 and netrw.v5 test cases.

Affected configurations

NVD
Node
vimvimMatch7.0
OR
vimvimMatch7.1
CPENameOperatorVersion
vim:vimvimeq7.0
vim:vimvimeq7.1

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.8 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

68.0%