CVE-2008-4677
Severity CVSS v4.0:
Pending analysis
Type:
CWE-255
Credentials Management
Publication date:
22/10/2008
Last modified:
09/04/2025
Description
autoload/netrw.vim (aka the Netrw Plugin) 109, 131, and other versions before 133k for Vim 7.1.266, other 7.1 versions, and 7.2 stores credentials for an FTP session, and sends those credentials when attempting to establish subsequent FTP sessions to servers on different hosts, which allows remote FTP servers to obtain sensitive information in opportunistic circumstances by logging usernames and passwords. NOTE: the upstream vendor disputes a vector involving different ports on the same host, stating "I'm assuming that they're using the same id and password on that unchanged hostname, deliberately."
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:vim:vim:7.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vim:vim:7.1.266:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vim:vim:7.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vim:netrw:109:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vim:netrw:110:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vim:netrw:111:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vim:netrw:112:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vim:netrw:113:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vim:netrw:114:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vim:netrw:115:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vim:netrw:116:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vim:netrw:118:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vim:netrw:120:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vim:netrw:121:*:*:*:*:*:*:* | ||
| cpe:2.3:a:vim:netrw:122:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6
- http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
- http://secunia.com/advisories/31464
- http://secunia.com/advisories/34418
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A236
- http://www.openwall.com/lists/oss-security/2008/10/06/4
- http://www.openwall.com/lists/oss-security/2008/10/16/2
- http://www.openwall.com/lists/oss-security/2008/10/20/2
- http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html
- http://www.securityfocus.com/archive/1/495432
- http://www.securityfocus.com/archive/1/495436
- http://www.securityfocus.com/bid/30670
- http://www.vupen.com/english/advisories/2008/2379
- https://bugzilla.redhat.com/show_bug.cgi?id=461750
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44419
- http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6
- http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
- http://secunia.com/advisories/31464
- http://secunia.com/advisories/34418
- http://www.mandriva.com/security/advisories?name=MDVSA-2008%3A236
- http://www.openwall.com/lists/oss-security/2008/10/06/4
- http://www.openwall.com/lists/oss-security/2008/10/16/2
- http://www.openwall.com/lists/oss-security/2008/10/20/2
- http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html
- http://www.securityfocus.com/archive/1/495432
- http://www.securityfocus.com/archive/1/495436
- http://www.securityfocus.com/bid/30670
- http://www.vupen.com/english/advisories/2008/2379
- https://bugzilla.redhat.com/show_bug.cgi?id=461750
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44419



