11 Comments
User's avatar
richardstevenhack's avatar

All this proves is that almost ANY software over a few thousand lines of code has a critical vulnerability in it.

That should have been obvious to anyone in cybersecurity.

hiepnq's avatar

Giờ làm hacker kiểu ngồi prompt với AI thôi là đủ à thật đáng sợ. Nhưng thật ra hiểu sâu đến mức có thể prompt được AI để hack cũng vẫn phải học bài bản đã. Sợ là bài viết này cổ vũ các bạn học tập hack chỉ bằng ngồi đốt token cho AI nhiều hơn.

Shoham Sen's avatar

My background is that i am a computational Material scientist, NOT A COMPUTER Scientist (but enthusiast).

I can tell you that a lot of scientists working on HPC ssh into remote clusters and use vim or emacs editors from the terminal to write and queue code for execution. I'm guessing opening vim after ssh-ing into a remote server will not be compromised by this bug, or am i wrong?

My guess is that this only affects people using vim on their home computer. Most people use VScode with vim plugin. I guess they didn't find anything else they would have reported it. I guess the question is:

Does this bug extend to vim plugins in VSCode??

Hung Ng's avatar

For the bugs described in the post, it will not compromise the local machine directly as we use ssh to connect to a remote server. But it could compromise the user on remote server that use vim (on remote server) to read/edit the malicious file. The direct impact can change in case someone wants to use local vim with SSHFS (to mount folders on remote server to local one).

For the vim plugin for VS Code (vscodevim/vim I think?), it's a Vim emulation extension and not actual vim software. It didn't implement the vulnerable function. Therefore, this bug is not applied to this vim for VS Code plugin.

Shoham Sen's avatar

thanks. Appreciate the input.

Andrei's avatar

There's been quite a few vim modeline vulnerabilities in the past:

https://security.stackexchange.com/questions/36001/vim-modeline-vulnerabilities

If you're a vim user, it's better to just add "set nomodeline" to your .vimrc

your_friend's avatar

Very interesting. Could you also share a Claude Code transcript next time, for example, using this tool: https://github.com/simonw/claude-code-transcripts

Aspirin Mumbo's avatar

if the second bug is related to Git, why not report it to Git first? what would stop someone from exploiting it outside of Emacs?

Lm's avatar

Excellent work. Thank you for sharing.

Ryan's avatar

I believe the patch version is wrong FYI, its 272 not 172

C S's avatar

Did you ask Claude where it found the exploit i.e. articles etc?