Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-12735 PoC — Vim 操作系统命令注入漏洞

Source
Associated Vulnerability
Title:Vim 操作系统命令注入漏洞 (CVE-2019-12735)
Description:getchar.c in Vim before 8.1.1365 and Neovim before 0.3.6 allows remote attackers to execute arbitrary OS commands via the :source! command in a modeline, as demonstrated by execute in Vim, and assert_fails or nvim_input in Neovim.
Description
Vim/Neovim Arbitrary Code Execution via Modelines (CVE-2019-12735)
Readme
# ace-vim-neovim
Vim/Neovim Arbitrary Code Execution via Modelines (CVE-2019-12735)

# Usage
1. listen
```
nc -vlp 9999
```
2. ace 
```
vim poc_shell.txt
```
And then, your localhost will get shell.
File Snapshot

[4.0K] /data/pocs/75ceefa9a0e5896cad19cfef6d073a67770c5782 ├── [ 144] poc_shell.txt ├── [ 75] poc_uname.txt └── [ 199] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →