In Vim before 8.1.0881, users can circumvent the rvim restricted mode and execute arbitrary OS commands via scripting interfaces (e.g., Python, Ruby, or Lua).
References
Link | Resource |
---|---|
https://github.com/vim/vim/commit/8c62a08faf89663e5633dc5036cd8695c80f1075 | Patch Third Party Advisory |
https://github.com/vim/vim/releases/tag/v8.1.0881 | Release Notes Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00018.html | Mailing List Third Party Advisory |
https://support.apple.com/kb/HT211289 | Third Party Advisory |
http://seclists.org/fulldisclosure/2020/Jul/24 | Mailing List Third Party Advisory |
https://usn.ubuntu.com/4582-1/ | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html | Mailing List Third Party Advisory |
https://www.starwindsoftware.com/security/sw-20220812-0003/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Information
Published : 2020-05-28 07:15
Updated : 2022-09-01 08:14
NVD link : CVE-2019-20807
Mitre link : CVE-2019-20807
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
vim
- vim
starwindsoftware
- command_center
- san_\&_nas
canonical
- ubuntu_linux
opensuse
- leap
debian
- debian_linux
apple
- mac_os_x