The shellescape function in Vim 7.0 through 7.2, including 7.2a.10, allows user-assisted attackers to execute arbitrary code via the "!" (exclamation point) shell metacharacter in (1) the filename of a ZIP archive and possibly (2) the filename of the first file in a ZIP archive, which is not properly handled by zip.vim in the VIM ZIP plugin (zipPlugin.vim) v.11 through v.21, as demonstrated by the zipplugin and zipplugin.v2 test cases. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2008-2712. NOTE: this issue has the same root cause as CVE-2008-3074. NOTE: due to the complexity of the associated disclosures and the incomplete information related to them, there may be inaccuracies in this CVE description and in external mappings to this identifier.
| Software | From | Fixed in |
|---|---|---|
| vim / vim | 7.1.266 | 7.1.266.x |
| vim / zipplugin.vim | .14 | .14.x |
| vim / zipplugin.vim | .12 | .12.x |
| vim / vim | 7.1 | 7.1.x |
| vim / zipplugin.vim | .18 | .18.x |
| vim / zipplugin.vim | .15 | .15.x |
| vim / vim | 7.0 | 7.0.x |
| vim / zipplugin.vim | .19 | .19.x |
| vim / vim | 7.2 | 7.2.x |
| vim / vim | 7.2a.10 | 7.2a.10.x |
| vim / zipplugin.vim | .11 | .11.x |
| vim / zipplugin.vim | .13 | .13.x |
| vim / zipplugin.vim | .20 | .20.x |
| vim / vim | 7.1.314 | 7.1.314.x |
| vim / zipplugin.vim | .17 | .17.x |
| vim / zipplugin.vim | .16 | .16.x |
| vim / zipplugin.vim | .21 | .21.x |