    {"id":539,"date":"2019-06-29T03:10:01","date_gmt":"2019-06-29T03:10:01","guid":{"rendered":"http:\/\/student-activity.binus.ac.id\/csc\/?p=539"},"modified":"2019-07-01T07:41:58","modified_gmt":"2019-07-01T07:41:58","slug":"linux-dapat-dihack-hanya-dengan-membuka-file-di-vim-atau-neovim-editor","status":"publish","type":"post","link":"https:\/\/student-activity.binus.ac.id\/csc\/2019\/06\/linux-dapat-dihack-hanya-dengan-membuka-file-di-vim-atau-neovim-editor\/","title":{"rendered":"Linux dapat dihack hanya dengan membuka file di Vim atau Neovim Editor"},"content":{"rendered":"<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:256}\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-540\" src=\"http:\/\/student-activity.binus.ac.id\/csc\/wp-content\/uploads\/sites\/37\/2019\/06\/vim_neovim.png\" alt=\"\" width=\"1063\" height=\"603\" \/><\/span><\/p>\n<p><b><span data-contrast=\"auto\">Editor Linux populer Vim dan Neovim telah ditemukan mengandung kelemahan yang sangat berbahaya yang dilacak dalam advisory CVE-2019-12735. Eksploitasi memungkinkan peretas untuk mengeksekusi kode arbitrer pada sistem operasi yang terpengaruh.<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:256}\">\u00a0<\/span><span data-contrast=\"auto\">Jika Anda pengguna Linux dan belum memperbarui sistem operasi Linux Anda, terutama command-line text editor utility, jangan coba-coba melihat konten sebuah file menggunakan Vim atau Neovim.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:256}\">\u00a0<\/span><span data-contrast=\"auto\">Peneliti keamanan Armin Razmjou baru-baru ini menemukan kerentanan OS command execution dengan tingkat keparahan yang\u00a0 tinggi (CVE-2019-12735) di Vim dan Neovim. Alasan mengapa ini adalah masalah utama adalah karena aplikasi ini sudah dipre-installed pada sistem korban. Aplikasi ini digunakan baik oleh pengguna, administrator dan pengembang untuk mengedit teks dan memanggil alat dan skrip third-party lainnya.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:256}\">\u00a0<\/span><span data-contrast=\"auto\">Pada sistem Linux, Vim editor memungkinkan pengguna untuk membuat, melihat atau mengedit file apa pun, termasuk teks, skrip pemrograman, dan dokumen.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:256}\">\u00a0<\/span><span data-contrast=\"auto\">Neovim hanyalah versi forked dari Vim, dengan pengalaman puser experience yang lebih baik, plugin dan GUIs, kerentanan code execution juga berada di dalamnya.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:256}\">\u00a0<\/span><span data-contrast=\"auto\">Vim dan Neovim adalah salah satu alat yang paling populer karena mereka adalah alat multiguna dan dapat berinteraksi dengan sistem menggunakan berbagai kait dan fungsi.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Kelemahan Eksekusi Kode di Vim dan Neovim<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-541\" src=\"http:\/\/student-activity.binus.ac.id\/csc\/wp-content\/uploads\/sites\/37\/2019\/06\/vim-800x476.jpg\" alt=\"\" width=\"800\" height=\"476\" \/><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:256}\">\u00a0<\/span><span data-contrast=\"auto\">Razmjou menemukan kelemahan dalam cara editor Vim menangani &#8220;modelines,&#8221; sebuah fitur yang diaktifkan secara default untuk secara otomatis menemukan dan menerapkan serangkaian custom preferences yang disebutkan oleh pembuat file di dekat baris awal dan akhir dalam dokumen.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Meskipun editor hanya mengizinkan subset opsi dalam modelines (untuk alasan keamanan) dan menggunakan sandbox protection jika berisi ekspresi yang tidak aman, Razmjou mengungkapkan bahwa menggunakan &#8220;:sumber!&#8221; command (dengan bang [!] modifier) \u200b\u200bdapat digunakan untuk mem-bypass sandbox.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:256}\">\u00a0<\/span><span data-contrast=\"auto\">Oleh karena itu, hanya membuka file yang dibuat khusus menggunakan Vim atau Neovim dapat memungkinkan hacker untuk diam-diam menjalankan perintah pada sistem Linux Anda dan mengambil kendali jarak jauh atas itu.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:256}\">\u00a0<\/span><span data-contrast=\"auto\">Peneliti juga telah merilis dua bukti exploit kepada publik, salah satunya menunjukkan skenario serangan real-life di mana seorang hacker secara jarak jauh mendapatkan akses ke reverse shell dari sistem korban segera setelah ia membuka file.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:256}\">\u00a0<\/span><span data-contrast=\"auto\">Maintainers Vim (patch 8.1.1365) dan Neovim (dirilis pada v0.3.6) telah merilis pembaruan untuk kedua utilitas untuk mengatasi masalah ini, yang harus install oleh pengguna sesegera mungkin.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Selain itu, peneliti juga merekomendasikan pengguna untuk:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">&#8211; menonaktifkan fitur modelines,<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">&#8211; nonaktifkan &#8220;modelineexpr&#8221; untuk melarang ekspresi dalam modelines,<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">&#8211; gunakan &#8220;securemodelines plugin,&#8221; alternatif aman untuk modelines Vim.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Sumber :\u00a0<\/span><a href=\"https:\/\/thehackernews.com\/2019\/06\/linux-vim-vulnerability.html\"><span data-contrast=\"none\">https:\/\/thehackernews.com\/2019\/06\/linux-vim-vulnerability.html<\/span><\/a><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.techapeek.com\/2019\/06\/11\/linux-vim-and-neovim-vulnerabilities-get-you-%20%20%20%20hacked\/\"><span data-contrast=\"none\">https:\/\/www.techapeek.com\/2019\/06\/11\/linux-vim-and-neovim-vulnerabilities-get-you-\u00a0\u00a0\u00a0 hacked\/<\/span><\/a><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:720,&quot;335559731&quot;:96,&quot;335559739&quot;:160,&quot;335559740&quot;:256}\">\u00a0<\/span><\/p>\n<p>Image source :<\/p>\n<p>https:\/\/cdn-images-1.medium.com\/max\/1600\/1*29Aag50a0S4f7nSlssE-fg.png<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Editor Linux populer Vim dan Neovim telah ditemukan mengandung kelemahan yang sangat berbahaya yang dilacak dalam advisory CVE-2019-12735. Eksploitasi memungkinkan peretas untuk mengeksekusi kode arbitrer pada sistem operasi yang terpengaruh.\u00a0 \u00a0Jika Anda pengguna Linux dan belum memperbarui sistem operasi Linux Anda, terutama command-line text editor utility, jangan coba-coba melihat konten sebuah file menggunakan Vim atau [&hellip;]<\/p>\n","protected":false},"author":42,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-539","post","type-post","status-publish","format-standard","hentry","category-articles"],"_links":{"self":[{"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/posts\/539","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/comments?post=539"}],"version-history":[{"count":1,"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/posts\/539\/revisions"}],"predecessor-version":[{"id":542,"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/posts\/539\/revisions\/542"}],"wp:attachment":[{"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/media?parent=539"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/categories?post=539"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student-activity.binus.ac.id\/csc\/wp-json\/wp\/v2\/tags?post=539"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}