Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-27423

Опубликовано: 03 мар. 2025
Источник: redhat
CVSS3: 6.1
EPSS Низкий

Описание

Vim is an open source, command line text editor. Vim is distributed with the tar.vim plugin, that allows easy editing and viewing of (compressed or uncompressed) tar files. Starting with 9.1.0858, the tar.vim plugin uses the ":read" ex command line to append below the cursor position, however the is not sanitized and is taken literally from the tar archive. This allows to execute shell commands via special crafted tar archives. Whether this really happens, depends on the shell being used ('shell' option, which is set using $SHELL). The issue has been fixed as of Vim patch v9.1.1164

A flaw was found in the tar.vim plugin of Vim. This vulnerability allows arbitrary command execution via specially crafted tar archives that exploit the unsanitized :read ex command.

Отчет

Red Hat believes this vulnerability to be of moderate impact due to the fact that successful execution requires both the shell-specific conditions as well as manual interaction on the part of the victim to open and interact with a specially-crafted tar file in vim.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10vimNot affected
Red Hat Enterprise Linux 6vimNot affected
Red Hat Enterprise Linux 7vimNot affected
Red Hat Enterprise Linux 8vimNot affected
Red Hat Enterprise Linux 9vimNot affected
Red Hat OpenShift Container Platform 4rhcosNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-77
https://bugzilla.redhat.com/show_bug.cgi?id=2349561vim: Improper Input Validation in Vim

EPSS

Процентиль: 32%
0.00122
Низкий

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.1
ubuntu
4 месяца назад

Vim is an open source, command line text editor. Vim is distributed with the tar.vim plugin, that allows easy editing and viewing of (compressed or uncompressed) tar files. Starting with 9.1.0858, the tar.vim plugin uses the ":read" ex command line to append below the cursor position, however the is not sanitized and is taken literally from the tar archive. This allows to execute shell commands via special crafted tar archives. Whether this really happens, depends on the shell being used ('shell' option, which is set using $SHELL). The issue has been fixed as of Vim patch v9.1.1164

CVSS3: 7.1
nvd
4 месяца назад

Vim is an open source, command line text editor. Vim is distributed with the tar.vim plugin, that allows easy editing and viewing of (compressed or uncompressed) tar files. Starting with 9.1.0858, the tar.vim plugin uses the ":read" ex command line to append below the cursor position, however the is not sanitized and is taken literally from the tar archive. This allows to execute shell commands via special crafted tar archives. Whether this really happens, depends on the shell being used ('shell' option, which is set using $SHELL). The issue has been fixed as of Vim patch v9.1.1164

CVSS3: 7.1
msrc
3 месяца назад

Описание отсутствует

CVSS3: 7.1
debian
4 месяца назад

Vim is an open source, command line text editor. Vim is distributed wi ...

CVSS3: 7.1
fstec
4 месяца назад

Уязвимость плагина tar.vim текстового редактора vim, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 32%
0.00122
Низкий

6.1 Medium

CVSS3