CVE-2019-20807

MEDIUM

Vim < 8.1.0881 - OS Command Injection

Title source: rule
STIX 2.1

Description

In Vim before 8.1.0881, users can circumvent the rvim restricted mode and execute arbitrary OS commands via scripting interfaces (e.g., Python, Ruby, or Lua).

References (8)

Core 8
Core References
Release Notes, Third Party Advisory x_refsource_misc
https://github.com/vim/vim/releases/tag/v8.1.0881
Mailing List, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00018.html
Third Party Advisory x_refsource_confirm
https://support.apple.com/kb/HT211289
Mailing List, Third Party Advisory mailing-list x_refsource_fulldisc
http://seclists.org/fulldisclosure/2020/Jul/24
Mailing List, Third Party Advisory vendor-advisory x_refsource_ubuntu
https://usn.ubuntu.com/4582-1/
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html
Third Party Advisory x_refsource_misc
https://www.starwindsoftware.com/security/sw-20220812-0003/

Scores

CVSS v3 5.3
EPSS 0.0021
EPSS Percentile 42.7%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Details

CWE
CWE-78
Status published
Products (9)
apple/mac_os_x 10.13.6
apple/mac_os_x 10.14.6
canonical/ubuntu_linux 16.04
canonical/ubuntu_linux 18.04
debian/debian_linux 9.0
opensuse/leap 15.1
starwindsoftware/command_center 2 build_6003
starwindsoftware/san_\&_nas 1.0 update_1
vim/vim < 8.1.0881
Published May 28, 2020
Tracked Since Feb 18, 2026