Vim is an open source, command line text editor. Prior to version 9.2.0073, an OS command injection vulnerability exists in the `netrw` standard plugin bundled with Vim. By inducing a user to open a crafted URL (e.g., using the `scp://` protocol handler), an attacker can execute arbitrary shell commands with the privileges of the Vim process. Version 9.2.0073 fixes the issue.
| Vendor | Product | Versions |
|---|---|---|
| vim | vim | < 9.2.0073 |
Downstream vendors/products affected by this vulnerability
| Vendor | Product | Source | Confidence |
|---|---|---|---|
| canonical | ubuntu linux | cert_advisory | 90% |
| fedora | fedora linux | cert_advisory | 90% |
| open source | vim | cert_advisory | 90% |
| su | suse linux | cert_advisory | 90% |
| su | suse opensuse | cert_advisory | 90% |