+++ This bug was initially created as a clone of Bug #238259 +++
Description of problem:
from the vim developer list:
> today somebody came to #vim, and pasted some modeline (containig joke or
> > such). He muttered something about not knowing what that means and left
> > before long. But (!) what I noticed is that feedkeys() was used as part of
> > foldexpression and it turned out that feedkeys() is allowed in sandbox,
> > which means malicious file can run arbitrary command via modeline like
> > this:
> > vim: fdm=expr fde=feedkeys("\\:!touch\ phantom_was_here\\<cr>")
> > I guess you can see the consequences. Is this known/intentional?
> That's pretty nasty. I'll make a patch right away.
This comment is from Bram Moolenaar, the upstream VIM maintainer
This issue is already public. Exploitable only if someone manages to get any
user to open a malicious file with vim. Even worse if that user is root ;-(
This should be fixed as fast as possible.
-- Additional comment from firstname.lastname@example.org on 2007-04-28 08:47 EST --
patch already available at
-- Additional comment from email@example.com on 2007-04-30 05:13 EST --
More issues have been found:
Fix available at http://tech.groups.yahoo.com/group/vimdev/message/46667
This flaw also affects FC7
vim-7.0.235-1.fc6 has been pushed for fc6, which should resolve this issue. If these problems are still present in this version, then please make note of it in this bug report.