CVE-2019-12735

getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.
OS Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.6 HIGH
LOCAL
LOW
NONE
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 97%
VendorProductVersion
vimvim
𝑥
< 8.1.1365
neovimneovim
𝑥
< 0.3.6
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
neovim
bullseye
0.4.4-1
fixed
bookworm
0.7.2-7
fixed
sid
0.9.5-10
fixed
trixie
0.9.5-10
fixed
vim
bullseye
2:8.2.2434-3+deb11u1
fixed
bookworm
2:9.0.1378-2
fixed
sid
2:9.1.0777-1
fixed
trixie
2:9.1.0777-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
neovim
lunar
not-affected
kinetic
not-affected
jammy
not-affected
impish
not-affected
hirsute
not-affected
groovy
not-affected
focal
not-affected
eoan
not-affected
disco
Fixed 0.3.4-1ubuntu0.19.04.1
released
cosmic
Fixed 0.3.1-1ubuntu0.1
released
bionic
Fixed 0.2.2-3ubuntu0.1~esm1
released
xenial
dne
trusty
dne
vim
lunar
Fixed 2:8.1.0875-4ubuntu1
released
kinetic
Fixed 2:8.1.0875-4ubuntu1
released
jammy
Fixed 2:8.1.0875-4ubuntu1
released
impish
Fixed 2:8.1.0875-4ubuntu1
released
hirsute
Fixed 2:8.1.0875-4ubuntu1
released
groovy
Fixed 2:8.1.0875-4ubuntu1
released
focal
Fixed 2:8.1.0875-4ubuntu1
released
eoan
Fixed 2:8.1.0875-4ubuntu1
released
disco
Fixed 2:8.1.0320-1ubuntu3.1
released
cosmic
Fixed 2:8.0.1766-1ubuntu1.1
released
bionic
Fixed 2:8.0.1453-1ubuntu1.1
released
xenial
Fixed 2:7.4.1689-3ubuntu1.3
released
trusty
not-affected
References