Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Wednesday June 12 2019, @11:37PM   Printer-friendly
from the cue-the-EMACS-laughter dept.

Submitted via IRC for SoyCow1944

Linux Command-Line Editors Vulnerable to High-Severity Bug

A bug impacting editors Vim and Neovim could allow a trojan code to escape sandbox mitigations.

A high-severity bug impacting two popular command-line text editing applications, Vim and Neovim, allow remote attackers to execute arbitrary OS commands. Security researcher Armin Razmjou warned that exploiting the bug is as easy as tricking a target into clicking on a specially crafted text file in either editor.

Razmjou outlined his research and created a proof-of-concept (PoC) attack demonstrating how an adversary can compromise a Linux system via Vim or Neowim [sic]. He said Vim versions before 8.1.1365 and Neovim before 0.3.6 are vulnerable to arbitrary code execution.

“[Outlined is] a real-life attack approach in which a reverse shell is launched once the user opens the file. To conceal the attack, the file will be immediately rewritten when opened. Also, the PoC uses terminal escape sequences to hide the modeline when the content is printed with cat. (cat -v reveals the actual content),” wrote Razmjou in a technical analysis of his research.

[...] “However, the :source! command (with the bang [!] modifier) can be used to bypass the sandbox. It reads and executes commands from a given file as if typed manually, running them after the sandbox has been left,” according to the PoC report.

Vim and Neovim have both released patches for the bug (CVE-2019-12735) that the National Institute of Standards and Technology warns, “allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline.”

“Beyond patching, it’s recommended to disable modelines in the vimrc (set nomodeline), to use the securemodelinesplugin, or to disable modelineexpr (since patch 8.1.1366, Vim-only) to disallow expressions in modelines,” the researcher said.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 0, Offtopic) by realDonaldTrump on Thursday June 13 2019, @12:04AM (1 child)

    by realDonaldTrump (6614) on Thursday June 13 2019, @12:04AM (#854928) Homepage Journal

    Do you know Passover? It's the celebration of, the Jews painted their doors in blood. So God would know which houses were the Jewish houses. And pass them by, or over. Skipped when He was killing so many baby boys. The Egyptian boys were dieing so painfully when God snatched away their lives. Although you have to wonder, how come God needed the blood to know which houses to skip, right?

    Anyway, so many of these Hack Attacks are just like that. They only happen to the folks that cheaped out on their cyber. The folks that spent a little more money get passed right over. Why not pamper yourself a little? Buy Microsoft Cyber!!!!

    Starting Score:    1  point
    Moderation   -1  
       Offtopic=2, Insightful=1, Funny=1, Overrated=1, Total=5
    Extra 'Offtopic' Modifier   0  

    Total Score:   0  
  • (Score: 2, Insightful) by Anonymous Coward on Thursday June 13 2019, @12:18AM

    by Anonymous Coward on Thursday June 13 2019, @12:18AM (#854933)

    Microsoft shill identified. Plonk!