EXECUTIVE SUMMARY:
A security issue has been identified in Vim, the widely used command-line text editor, affecting its zip.vim plugin. The flaw allows attackers to overwrite files by crafting malicious zip archives that take advantage of a path traversal weakness. The bug is categorized under CWE-22 and is present in all Vim versions earlier than 9.1.1551. When users open such archives using Vim, the plugin does not correctly check file paths, enabling overwrite of files outside the intended directory. The vulnerability has a CVSS 3.1 score of 4.1, indicating a medium severity level. Although the attack requires user interaction and local access, the impact can include sensitive file compromise and limited command execution.
This vulnerability in Vim poses a real threat to system integrity by allowing overwrites of important files through crafted zip archives. The bug depends on user interaction, but careless use can result in system compromise and potential command execution.
RECOMMENDATION:
REFERENCES:
The following reports contain further technical details: