CVE-2019-20807

EUVD-2019-11344
In Vim before 8.1.0881, users can circumvent the rvim restricted mode and execute arbitrary OS commands via scripting interfaces (e.g., Python, Ruby, or Lua).
OS Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.3 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Base Score
CVSS 3.x
EPSS Score
Percentile: 42%
Affected Products (NVD)
VendorProductVersion
vimvim
𝑥
< 8.1.0881
debiandebian_linux
9.0
opensuseleap
15.1
canonicalubuntu_linux
16.04
canonicalubuntu_linux
18.04
applemac_os_x
10.13.6
applemac_os_x
10.14.6
starwindsoftwaresan_\&_nas
1.0:update_1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
vim
bookworm
2:9.0.1378-2
fixed
bullseye
2:8.2.2434-3+deb11u1
fixed
jessie
no-dsa
sid
2:9.1.0777-1
fixed
trixie
2:9.1.0777-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
vim
bionic
Fixed 2:8.0.1453-1ubuntu1.4
released
eoan
ignored
focal
not-affected
groovy
not-affected
hirsute
not-affected
impish
not-affected
jammy
not-affected
trusty
Fixed 2:7.4.052-1ubuntu3.1+esm4
released
xenial
Fixed 2:7.4.1689-3ubuntu1.5
released