Related Vulnerabilities: CVE-2016-1248  

A vulnerability has been discovered in vim which would allow arbitrary shell commands to be run if a user opened a file with a malicious modeline. This is due to lack of validation of values for a few options. Those options' values are then used in vim's scripts to build a command string that's evaluated by execute, which is what allows the shell commands to be run. This has been fixed in Vim by patch 8.0.0056. Since Neovim shares this code, it is also vulnerable.

Severity High

Remote No

Type Arbitrary command execution

Description

A vulnerability has been discovered in vim which would allow arbitrary shell commands to be run if a user opened a file with a malicious modeline. This is due to lack of validation of values for a few options. Those options' values are then used in vim's scripts to build a command string that's evaluated by execute, which is what allows the shell commands to be run.

This has been fixed in Vim by patch 8.0.0056. Since Neovim shares this code, it is also vulnerable.

AVG-83 vim 8.0.0055-1 8.0.0056-1 High Fixed

AVG-82 neovim 0.1.6-1 0.1.7-1 High Fixed FS#51927

29 Nov 2016 ASA-201611-29 AVG-82 neovim High arbitrary command execution

https://github.com/vim/vim/commit/d0b5138ba4bccff8a744c99836041ef6322ed39a
https://github.com/neovim/neovim/commit/4fad66fbe637818b6b3d6bc5d21923ba72795040