Vulnerability Database

289,697

Total vulnerabilities in the database

CVE-2008-3075

The shellescape function in Vim 7.0 through 7.2, including 7.2a.10, allows user-assisted attackers to execute arbitrary code via the "!" (exclamation point) shell metacharacter in (1) the filename of a ZIP archive and possibly (2) the filename of the first file in a ZIP archive, which is not properly handled by zip.vim in the VIM ZIP plugin (zipPlugin.vim) v.11 through v.21, as demonstrated by the zipplugin and zipplugin.v2 test cases. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2008-2712. NOTE: this issue has the same root cause as CVE-2008-3074. NOTE: due to the complexity of the associated disclosures and the incomplete information related to them, there may be inaccuracies in this CVE description and in external mappings to this identifier.

  • Published: Feb 21, 2009
  • Updated: Apr 13, 2023
  • CVE: CVE-2008-3075
  • Severity: High
  • Exploit:

CVSS v2:

  • Severity: High
  • Score: 9.3
  • AV:N/AC:M/Au:N/C:C/I:C/A:C

CWEs:

Software From Fixed in
vim / vim 7.1.266 7.1.266.x
vim / zipplugin.vim .14 .14.x
vim / zipplugin.vim .12 .12.x
vim / vim 7.1 7.1.x
vim / zipplugin.vim .18 .18.x
vim / zipplugin.vim .15 .15.x
vim / vim 7.0 7.0.x
vim / zipplugin.vim .19 .19.x
vim / vim 7.2 7.2.x
vim / vim 7.2a.10 7.2a.10.x
vim / zipplugin.vim .11 .11.x
vim / zipplugin.vim .13 .13.x
vim / zipplugin.vim .20 .20.x
vim / vim 7.1.314 7.1.314.x
vim / zipplugin.vim .17 .17.x
vim / zipplugin.vim .16 .16.x
vim / zipplugin.vim .21 .21.x