CVE-2019-12735

EUVD-2019-4324
getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.
OS Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.6 HIGH
LOCAL
LOW
NONE
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 98%
Affected Products (NVD)
VendorProductVersion
vimvim
𝑥
< 8.1.1365
neovimneovim
𝑥
< 0.3.6
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
neovim
bookworm
0.7.2-7
fixed
bullseye
0.4.4-1
fixed
sid
0.9.5-10
fixed
trixie
0.9.5-10
fixed
vim
bookworm
2:9.0.1378-2
fixed
bullseye
2:8.2.2434-3+deb11u1
fixed
sid
2:9.1.0777-1
fixed
trixie
2:9.1.0777-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
neovim
bionic
Fixed 0.2.2-3ubuntu0.1~esm1
released
cosmic
Fixed 0.3.1-1ubuntu0.1
released
disco
Fixed 0.3.4-1ubuntu0.19.04.1
released
eoan
not-affected
focal
not-affected
groovy
not-affected
hirsute
not-affected
impish
not-affected
jammy
not-affected
kinetic
not-affected
lunar
not-affected
trusty
dne
xenial
dne
vim
bionic
Fixed 2:8.0.1453-1ubuntu1.1
released
cosmic
Fixed 2:8.0.1766-1ubuntu1.1
released
disco
Fixed 2:8.1.0320-1ubuntu3.1
released
eoan
Fixed 2:8.1.0875-4ubuntu1
released
focal
Fixed 2:8.1.0875-4ubuntu1
released
groovy
Fixed 2:8.1.0875-4ubuntu1
released
hirsute
Fixed 2:8.1.0875-4ubuntu1
released
impish
Fixed 2:8.1.0875-4ubuntu1
released
jammy
Fixed 2:8.1.0875-4ubuntu1
released
kinetic
Fixed 2:8.1.0875-4ubuntu1
released
lunar
Fixed 2:8.1.0875-4ubuntu1
released
trusty
not-affected
xenial
Fixed 2:7.4.1689-3ubuntu1.3
released
References