CVE-2019-20807
vim: users can execute arbitrary OS commands via scripting interfaces in the rvim restricted mode
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In Vim before 8.1.0881, users can circumvent the rvim restricted mode and execute arbitrary OS commands via scripting interfaces (e.g., Python, Ruby, or Lua).
En Vim versiones anteriores a 8.1.0881, los usuarios pueden omitir el modo restringido rvim y ejecutar comandos arbitrarios de Sistema Operativo por medio de interfaces de scripting (por ejemplo, Python, Ruby o Lua).
A flaw was found in vim in the restricted mode, where all commands that make use of external shells are disabled. However, it was found that users could still execute some arbitrary OS commands in the restricted mode. This flaw was fixed by filtering the functions that can call OS commands. Interfaces such as Python, Ruby, and Lua, are also disabled, as they can be used to execute shell commands. Perl uses the Safe module.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-05-28 CVE Reserved
- 2020-05-28 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://seclists.org/fulldisclosure/2020/Jul/24 | Mailing List | |
https://github.com/vim/vim/releases/tag/v8.1.0881 | Release Notes | |
https://lists.debian.org/debian-lts-announce/2022/01/msg00003.html | Mailing List | |
https://support.apple.com/kb/HT211289 | Third Party Advisory | |
https://www.starwindsoftware.com/security/sw-20220812-0003 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/vim/vim/commit/8c62a08faf89663e5633dc5036cd8695c80f1075 | 2022-09-01 |
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00018.html | 2022-09-01 | |
https://usn.ubuntu.com/4582-1 | 2022-09-01 | |
https://access.redhat.com/security/cve/CVE-2019-20807 | 2020-11-04 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1842658 | 2020-11-04 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Vim Search vendor "Vim" | Vim Search vendor "Vim" for product "Vim" | < 8.1.0881 Search vendor "Vim" for product "Vim" and version " < 8.1.0881" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Leap Search vendor "Opensuse" for product "Leap" | 15.1 Search vendor "Opensuse" for product "Leap" and version "15.1" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 16.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04" | esm |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 18.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "18.04" | lts |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.13.6 Search vendor "Apple" for product "Mac Os X" and version "10.13.6" | - |
Affected
| ||||||
Apple Search vendor "Apple" | Mac Os X Search vendor "Apple" for product "Mac Os X" | 10.14.6 Search vendor "Apple" for product "Mac Os X" and version "10.14.6" | - |
Affected
| ||||||
Starwindsoftware Search vendor "Starwindsoftware" | Command Center Search vendor "Starwindsoftware" for product "Command Center" | 2 Search vendor "Starwindsoftware" for product "Command Center" and version "2" | build_6003 |
Affected
| ||||||
Starwindsoftware Search vendor "Starwindsoftware" | San \& Nas Search vendor "Starwindsoftware" for product "San \& Nas" | 1.0 Search vendor "Starwindsoftware" for product "San \& Nas" and version "1.0" | update_1 |
Affected
|