All the vulnerabilites related to Document Foundation - LibreOffice
cve-2019-9847
Vulnerability from cvelistv5
Published
2019-05-09 13:51
Modified
2024-09-16 20:41
Severity ?
EPSS score ?
Summary
A vulnerability in LibreOffice hyperlink processing allows an attacker to construct documents containing hyperlinks pointing to the location of an executable on the target users file system. If the hyperlink is activated by the victim the executable target is unconditionally launched. Under Windows and macOS when processing a hyperlink target explicitly activated by the user there was no judgment made on whether the target was an executable file, so such executable targets were launched unconditionally. This issue affects: All LibreOffice Windows and macOS versions prior to 6.1.6; LibreOffice Windows and macOS versions in the 6.2 series prior to 6.2.3.
References
▼ | URL | Tags |
---|---|---|
https://www.libreoffice.org/about-us/security/advisories/cve-2019-9847/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Document Foundation | LibreOffice |
Version: unspecified < 6.1.6 Version: unspecified < 6.2.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:01:55.073Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.libreoffice.org/about-us/security/advisories/cve-2019-9847/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "LibreOffice", "vendor": "Document Foundation", "versions": [ { "lessThan": "6.1.6", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "6.2.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Zhongcheng Li(CK01) of Pox Security Team" } ], "datePublic": "2019-05-08T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in LibreOffice hyperlink processing allows an attacker to construct documents containing hyperlinks pointing to the location of an executable on the target users file system. If the hyperlink is activated by the victim the executable target is unconditionally launched. Under Windows and macOS when processing a hyperlink target explicitly activated by the user there was no judgment made on whether the target was an executable file, so such executable targets were launched unconditionally. This issue affects: All LibreOffice Windows and macOS versions prior to 6.1.6; LibreOffice Windows and macOS versions in the 6.2 series prior to 6.2.3." } ], "problemTypes": [ { "descriptions": [ { "description": "Code Execution Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-09T13:51:04", "orgId": "4fe7d05b-1353-44cc-8b7a-1e416936dff2", "shortName": "Document Fdn." }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.libreoffice.org/about-us/security/advisories/cve-2019-9847/" } ], "solutions": [ { "lang": "en", "value": "Upgrade to LibreOffice 6.1.6 or 6.2.3" } ], "source": { "discovery": "EXTERNAL" }, "title": "Executable hyperlink targets executed unconditionally on activation", "x_generator": { "engine": "Vulnogram 0.0.6" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@documentfoundation.org", "DATE_PUBLIC": "2019-05-08T00:00:00.000Z", "ID": "CVE-2019-9847", "STATE": "PUBLIC", "TITLE": "Executable hyperlink targets executed unconditionally on activation" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "LibreOffice", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "6.1.6" }, { "version_affected": "\u003c", "version_value": "6.2.3" } ] } } ] }, "vendor_name": "Document Foundation" } ] } }, "credit": [ { "lang": "eng", "value": "Zhongcheng Li(CK01) of Pox Security Team" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in LibreOffice hyperlink processing allows an attacker to construct documents containing hyperlinks pointing to the location of an executable on the target users file system. If the hyperlink is activated by the victim the executable target is unconditionally launched. Under Windows and macOS when processing a hyperlink target explicitly activated by the user there was no judgment made on whether the target was an executable file, so such executable targets were launched unconditionally. This issue affects: All LibreOffice Windows and macOS versions prior to 6.1.6; LibreOffice Windows and macOS versions in the 6.2 series prior to 6.2.3." } ] }, "generator": { "engine": "Vulnogram 0.0.6" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Code Execution Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.libreoffice.org/about-us/security/advisories/cve-2019-9847/", "refsource": "CONFIRM", "url": "https://www.libreoffice.org/about-us/security/advisories/cve-2019-9847/" } ] }, "solution": [ { "lang": "en", "value": "Upgrade to LibreOffice 6.1.6 or 6.2.3" } ], "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "4fe7d05b-1353-44cc-8b7a-1e416936dff2", "assignerShortName": "Document Fdn.", "cveId": "CVE-2019-9847", "datePublished": "2019-05-09T13:51:04.424723Z", "dateReserved": "2019-03-17T00:00:00", "dateUpdated": "2024-09-16T20:41:44.237Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-9849
Vulnerability from cvelistv5
Published
2019-07-17 11:26
Modified
2024-09-17 00:06
Severity ?
EPSS score ?
Summary
LibreOffice has a 'stealth mode' in which only documents from locations deemed 'trusted' are allowed to retrieve remote resources. This mode is not the default mode, but can be enabled by users who want to disable LibreOffice's ability to include remote resources within a document. A flaw existed where bullet graphics were omitted from this protection prior to version 6.2.5. This issue affects: Document Foundation LibreOffice versions prior to 6.2.5.
References
▼ | URL | Tags |
---|---|---|
https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9849 | x_refsource_CONFIRM | |
https://usn.ubuntu.com/4063-1/ | vendor-advisory, x_refsource_UBUNTU | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XPTZJCNN52VNGSVC5DFKVW3EDMRDWKMP/ | vendor-advisory, x_refsource_FEDORA | |
http://www.securityfocus.com/bid/109374 | vdb-entry, x_refsource_BID | |
https://security.gentoo.org/glsa/201908-13 | vendor-advisory, x_refsource_GENTOO | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PMEGUWMWORC3DOVEHVXLFT3A5RSCMLBH/ | vendor-advisory, x_refsource_FEDORA | |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html | vendor-advisory, x_refsource_SUSE | |
https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html | mailing-list, x_refsource_MLIST |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Document Foundation | LibreOffice |
Version: unspecified < 6.2.5 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:01:55.088Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9849" }, { "name": "USN-4063-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4063-1/" }, { "name": "FEDORA-2019-5561d20558", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XPTZJCNN52VNGSVC5DFKVW3EDMRDWKMP/" }, { "name": "109374", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/109374" }, { "name": "GLSA-201908-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201908-13" }, { "name": "FEDORA-2019-2fe22a3a2c", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PMEGUWMWORC3DOVEHVXLFT3A5RSCMLBH/" }, { "name": "openSUSE-SU-2019:2057", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html" }, { "name": "openSUSE-SU-2019:2183", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" }, { "name": "[debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "LibreOffice", "vendor": "Document Foundation", "versions": [ { "lessThan": "6.2.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Thanks to Matei \"Mal\" Badanoiu for discovering and reporting this problem" } ], "datePublic": "2019-07-16T00:00:00", "descriptions": [ { "lang": "en", "value": "LibreOffice has a \u0027stealth mode\u0027 in which only documents from locations deemed \u0027trusted\u0027 are allowed to retrieve remote resources. This mode is not the default mode, but can be enabled by users who want to disable LibreOffice\u0027s ability to include remote resources within a document. A flaw existed where bullet graphics were omitted from this protection prior to version 6.2.5. This issue affects: Document Foundation LibreOffice versions prior to 6.2.5." } ], "problemTypes": [ { "descriptions": [ { "description": "In \u0027stealth mode\u0027 where only trusted documents are allowed to download remote resources untrusted documents could download remote bullet graphics urls", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-06T13:06:06", "orgId": "4fe7d05b-1353-44cc-8b7a-1e416936dff2", "shortName": "Document Fdn." }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9849" }, { "name": "USN-4063-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4063-1/" }, { "name": "FEDORA-2019-5561d20558", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XPTZJCNN52VNGSVC5DFKVW3EDMRDWKMP/" }, { "name": "109374", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/109374" }, { "name": "GLSA-201908-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201908-13" }, { "name": "FEDORA-2019-2fe22a3a2c", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PMEGUWMWORC3DOVEHVXLFT3A5RSCMLBH/" }, { "name": "openSUSE-SU-2019:2057", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html" }, { "name": "openSUSE-SU-2019:2183", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" }, { "name": "[debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html" } ], "source": { "defect": [ "remote", "bullet", "graphics", "retrieved", "in", "\u0027stealth", "mode\u0027" ], "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.7" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@documentfoundation.org", "DATE_PUBLIC": "2019-07-16T00:00:00.000Z", "ID": "CVE-2019-9849", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "LibreOffice", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "6.2.5" } ] } } ] }, "vendor_name": "Document Foundation" } ] } }, "credit": [ { "lang": "eng", "value": "Thanks to Matei \"Mal\" Badanoiu for discovering and reporting this problem" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "LibreOffice has a \u0027stealth mode\u0027 in which only documents from locations deemed \u0027trusted\u0027 are allowed to retrieve remote resources. This mode is not the default mode, but can be enabled by users who want to disable LibreOffice\u0027s ability to include remote resources within a document. A flaw existed where bullet graphics were omitted from this protection prior to version 6.2.5. This issue affects: Document Foundation LibreOffice versions prior to 6.2.5." } ] }, "generator": { "engine": "Vulnogram 0.0.7" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "In \u0027stealth mode\u0027 where only trusted documents are allowed to download remote resources untrusted documents could download remote bullet graphics urls" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9849", "refsource": "CONFIRM", "url": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9849" }, { "name": "USN-4063-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4063-1/" }, { "name": "FEDORA-2019-5561d20558", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPTZJCNN52VNGSVC5DFKVW3EDMRDWKMP/" }, { "name": "109374", "refsource": "BID", "url": "http://www.securityfocus.com/bid/109374" }, { "name": "GLSA-201908-13", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201908-13" }, { "name": "FEDORA-2019-2fe22a3a2c", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PMEGUWMWORC3DOVEHVXLFT3A5RSCMLBH/" }, { "name": "openSUSE-SU-2019:2057", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html" }, { "name": "openSUSE-SU-2019:2183", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" }, { "name": "[debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html" } ] }, "source": { "defect": [ "remote", "bullet", "graphics", "retrieved", "in", "\u0027stealth", "mode\u0027" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "4fe7d05b-1353-44cc-8b7a-1e416936dff2", "assignerShortName": "Document Fdn.", "cveId": "CVE-2019-9849", "datePublished": "2019-07-17T11:26:03.387949Z", "dateReserved": "2019-03-17T00:00:00", "dateUpdated": "2024-09-17T00:06:18.219Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-9853
Vulnerability from cvelistv5
Published
2019-09-27 15:07
Modified
2024-09-16 17:17
Severity ?
EPSS score ?
Summary
LibreOffice documents can contain macros. The execution of those macros is controlled by the document security settings, typically execution of macros are blocked by default. A URL decoding flaw existed in how the urls to the macros within the document were processed and categorized, resulting in the possibility to construct a document where macro execution bypassed the security settings. The documents were correctly detected as containing macros, and prompted the user to their existence within the documents, but macros within the document were subsequently not controlled by the security settings allowing arbitrary macro execution This issue affects: LibreOffice 6.2 series versions prior to 6.2.7; LibreOffice 6.3 series versions prior to 6.3.1.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Document Foundation | LibreOffice |
Version: 6.2 series < 6.2.7 Version: 6.3 series < 6.3.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:01:54.937Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9853/" }, { "name": "[debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html" }, { "name": "FEDORA-2019-4b0cc75996", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQGBRSD73KTDZ2MPAOL7FBWO3SQVYE5B/" }, { "name": "[openoffice-commits] 20191016 svn commit: r1051583 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2019-9853.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/3a5570ca5cd14ad08e24684c71cfeff3a507f108fe3cf30ba4f58226%40%3Ccommits.openoffice.apache.org%3E" }, { "name": "[openoffice-commits] 20191016 svn commit: r1868517 - /openoffice/ooo-site/trunk/content/security/cves/CVE-2019-9853.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/4ae0e6e52600f408d943ded079d314733ce188b04b04471464f89c4f%40%3Ccommits.openoffice.apache.org%3E" }, { "name": "[openoffice-commits] 20191016 svn commit: r1868522 - /openoffice/ooo-site/trunk/content/security/bulletin.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/7394e6b5f78a878bd0c44e9bc9adf90b8cdf49e9adc0f287145aba9b%40%3Ccommits.openoffice.apache.org%3E" }, { "name": "[openoffice-commits] 20191124 svn commit: r1870322 - /openoffice/ooo-site/trunk/content/security/cves/CVE-2019-9853.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/a540d1b6f9a7ebb206adba02839f654a6ee63a7b0976f559a847e49a%40%3Ccommits.openoffice.apache.org%3E" }, { "name": "[openoffice-commits] 20191124 svn commit: r1053264 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2019-9853.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/a5231ad45b030b54828c7b0b62a7e7d4b48481c7cb83ff628e07fa43%40%3Ccommits.openoffice.apache.org%3E" }, { "name": "[openoffice-commits] 20191124 svn commit: r1053267 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2019-9853.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/9dc85d9937ad7f101047c53f78c00e8ceb135eaeff7dcf4724b46f2c%40%3Ccommits.openoffice.apache.org%3E" }, { "name": "[openoffice-commits] 20191124 svn commit: r1870324 - /openoffice/ooo-site/trunk/content/security/cves/CVE-2019-9853.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/70da9481dca267405e1d79e53942264765ef3f55c9a563c3737e3926%40%3Ccommits.openoffice.apache.org%3E" }, { "name": "[openoffice-commits] 20191124 svn commit: r1870337 - in /openoffice/ooo-site/trunk/content/security/cves: CVE-2019-9853.html CVE-XXXX-YYYY.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/ca216900abd846f0220fe18b95f9f787bdbe0e87fa4eee822073cd69%40%3Ccommits.openoffice.apache.org%3E" }, { "name": "[openoffice-commits] 20191124 svn commit: r1053270 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2019-9853.html content/security/cves/CVE-XXXX-YYYY.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/27339e8a9a1e9bb47fbdb939b338256d0356250a1974aaf4d774f683%40%3Ccommits.openoffice.apache.org%3E" }, { "name": "[openoffice-commits] 20191124 svn commit: r1053271 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2019-9853.html content/security/cves/CVE-XXXX-YYYY.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/19c917f7c8a0d8f62142046fabfe3e2c7d6091ef1f92b99c6e79e24e%40%3Ccommits.openoffice.apache.org%3E" }, { "name": "[openoffice-commits] 20191124 svn commit: r1870336 - in /openoffice/ooo-site/trunk/content/security/cves: CVE-2019-9853.html CVE-XXXX-YYYY.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/306a374361891eb17c6cffc99c3d7be1d3152a99c839d4231edc1631%40%3Ccommits.openoffice.apache.org%3E" }, { "name": "openSUSE-SU-2019:2709", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00040.html" }, { "name": "20200220 Open-Xchange Security Advisory 2020-02-19", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2020/Feb/23" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/156474/Open-Xchange-App-Suite-Documents-Server-Side-Request-Forgery.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "LibreOffice", "vendor": "Document Foundation", "versions": [ { "lessThan": "6.2.7", "status": "affected", "version": "6.2 series", "versionType": "custom" }, { "lessThan": "6.3.1", "status": "affected", "version": "6.3 series", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Thanks to Nils Emmerich of ERNW Research GmbH for discovering and reporting this issue" } ], "datePublic": "2019-09-27T00:00:00", "descriptions": [ { "lang": "en", "value": "LibreOffice documents can contain macros. The execution of those macros is controlled by the document security settings, typically execution of macros are blocked by default. A URL decoding flaw existed in how the urls to the macros within the document were processed and categorized, resulting in the possibility to construct a document where macro execution bypassed the security settings. The documents were correctly detected as containing macros, and prompted the user to their existence within the documents, but macros within the document were subsequently not controlled by the security settings allowing arbitrary macro execution This issue affects: LibreOffice 6.2 series versions prior to 6.2.7; LibreOffice 6.3 series versions prior to 6.3.1." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-116", "description": "CWE-116 Improper Encoding or Escaping of Output", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-21T17:06:02", "orgId": "4fe7d05b-1353-44cc-8b7a-1e416936dff2", "shortName": "Document Fdn." }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9853/" }, { "name": "[debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html" }, { "name": "FEDORA-2019-4b0cc75996", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQGBRSD73KTDZ2MPAOL7FBWO3SQVYE5B/" }, { "name": "[openoffice-commits] 20191016 svn commit: r1051583 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2019-9853.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/3a5570ca5cd14ad08e24684c71cfeff3a507f108fe3cf30ba4f58226%40%3Ccommits.openoffice.apache.org%3E" }, { "name": "[openoffice-commits] 20191016 svn commit: r1868517 - /openoffice/ooo-site/trunk/content/security/cves/CVE-2019-9853.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/4ae0e6e52600f408d943ded079d314733ce188b04b04471464f89c4f%40%3Ccommits.openoffice.apache.org%3E" }, { "name": "[openoffice-commits] 20191016 svn commit: r1868522 - /openoffice/ooo-site/trunk/content/security/bulletin.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/7394e6b5f78a878bd0c44e9bc9adf90b8cdf49e9adc0f287145aba9b%40%3Ccommits.openoffice.apache.org%3E" }, { "name": "[openoffice-commits] 20191124 svn commit: r1870322 - /openoffice/ooo-site/trunk/content/security/cves/CVE-2019-9853.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/a540d1b6f9a7ebb206adba02839f654a6ee63a7b0976f559a847e49a%40%3Ccommits.openoffice.apache.org%3E" }, { "name": "[openoffice-commits] 20191124 svn commit: r1053264 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2019-9853.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/a5231ad45b030b54828c7b0b62a7e7d4b48481c7cb83ff628e07fa43%40%3Ccommits.openoffice.apache.org%3E" }, { "name": "[openoffice-commits] 20191124 svn commit: r1053267 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2019-9853.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/9dc85d9937ad7f101047c53f78c00e8ceb135eaeff7dcf4724b46f2c%40%3Ccommits.openoffice.apache.org%3E" }, { "name": "[openoffice-commits] 20191124 svn commit: r1870324 - /openoffice/ooo-site/trunk/content/security/cves/CVE-2019-9853.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/70da9481dca267405e1d79e53942264765ef3f55c9a563c3737e3926%40%3Ccommits.openoffice.apache.org%3E" }, { "name": "[openoffice-commits] 20191124 svn commit: r1870337 - in /openoffice/ooo-site/trunk/content/security/cves: CVE-2019-9853.html CVE-XXXX-YYYY.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/ca216900abd846f0220fe18b95f9f787bdbe0e87fa4eee822073cd69%40%3Ccommits.openoffice.apache.org%3E" }, { "name": "[openoffice-commits] 20191124 svn commit: r1053270 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2019-9853.html content/security/cves/CVE-XXXX-YYYY.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/27339e8a9a1e9bb47fbdb939b338256d0356250a1974aaf4d774f683%40%3Ccommits.openoffice.apache.org%3E" }, { "name": "[openoffice-commits] 20191124 svn commit: r1053271 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2019-9853.html content/security/cves/CVE-XXXX-YYYY.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/19c917f7c8a0d8f62142046fabfe3e2c7d6091ef1f92b99c6e79e24e%40%3Ccommits.openoffice.apache.org%3E" }, { "name": "[openoffice-commits] 20191124 svn commit: r1870336 - in /openoffice/ooo-site/trunk/content/security/cves: CVE-2019-9853.html CVE-XXXX-YYYY.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/306a374361891eb17c6cffc99c3d7be1d3152a99c839d4231edc1631%40%3Ccommits.openoffice.apache.org%3E" }, { "name": "openSUSE-SU-2019:2709", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00040.html" }, { "name": "20200220 Open-Xchange Security Advisory 2020-02-19", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2020/Feb/23" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/156474/Open-Xchange-App-Suite-Documents-Server-Side-Request-Forgery.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Insufficient URL decoding flaw in categorizing macro location", "x_generator": { "engine": "Vulnogram 0.0.8" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@documentfoundation.org", "DATE_PUBLIC": "2019-09-27T00:00:00.000Z", "ID": "CVE-2019-9853", "STATE": "PUBLIC", "TITLE": "Insufficient URL decoding flaw in categorizing macro location" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "LibreOffice", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "6.2 series", "version_value": "6.2.7" }, { "version_affected": "\u003c", "version_name": "6.3 series", "version_value": "6.3.1" } ] } } ] }, "vendor_name": "Document Foundation" } ] } }, "credit": [ { "lang": "eng", "value": "Thanks to Nils Emmerich of ERNW Research GmbH for discovering and reporting this issue" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "LibreOffice documents can contain macros. The execution of those macros is controlled by the document security settings, typically execution of macros are blocked by default. A URL decoding flaw existed in how the urls to the macros within the document were processed and categorized, resulting in the possibility to construct a document where macro execution bypassed the security settings. The documents were correctly detected as containing macros, and prompted the user to their existence within the documents, but macros within the document were subsequently not controlled by the security settings allowing arbitrary macro execution This issue affects: LibreOffice 6.2 series versions prior to 6.2.7; LibreOffice 6.3 series versions prior to 6.3.1." } ] }, "generator": { "engine": "Vulnogram 0.0.8" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-116 Improper Encoding or Escaping of Output" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9853/", "refsource": "CONFIRM", "url": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9853/" }, { "name": "[debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html" }, { "name": "FEDORA-2019-4b0cc75996", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQGBRSD73KTDZ2MPAOL7FBWO3SQVYE5B/" }, { "name": "[openoffice-commits] 20191016 svn commit: r1051583 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2019-9853.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/3a5570ca5cd14ad08e24684c71cfeff3a507f108fe3cf30ba4f58226@%3Ccommits.openoffice.apache.org%3E" }, { "name": "[openoffice-commits] 20191016 svn commit: r1868517 - /openoffice/ooo-site/trunk/content/security/cves/CVE-2019-9853.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/4ae0e6e52600f408d943ded079d314733ce188b04b04471464f89c4f@%3Ccommits.openoffice.apache.org%3E" }, { "name": "[openoffice-commits] 20191016 svn commit: r1868522 - /openoffice/ooo-site/trunk/content/security/bulletin.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/7394e6b5f78a878bd0c44e9bc9adf90b8cdf49e9adc0f287145aba9b@%3Ccommits.openoffice.apache.org%3E" }, { "name": "[openoffice-commits] 20191124 svn commit: r1870322 - /openoffice/ooo-site/trunk/content/security/cves/CVE-2019-9853.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/a540d1b6f9a7ebb206adba02839f654a6ee63a7b0976f559a847e49a@%3Ccommits.openoffice.apache.org%3E" }, { "name": "[openoffice-commits] 20191124 svn commit: r1053264 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2019-9853.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/a5231ad45b030b54828c7b0b62a7e7d4b48481c7cb83ff628e07fa43@%3Ccommits.openoffice.apache.org%3E" }, { "name": "[openoffice-commits] 20191124 svn commit: r1053267 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2019-9853.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/9dc85d9937ad7f101047c53f78c00e8ceb135eaeff7dcf4724b46f2c@%3Ccommits.openoffice.apache.org%3E" }, { "name": "[openoffice-commits] 20191124 svn commit: r1870324 - /openoffice/ooo-site/trunk/content/security/cves/CVE-2019-9853.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/70da9481dca267405e1d79e53942264765ef3f55c9a563c3737e3926@%3Ccommits.openoffice.apache.org%3E" }, { "name": "[openoffice-commits] 20191124 svn commit: r1870337 - in /openoffice/ooo-site/trunk/content/security/cves: CVE-2019-9853.html CVE-XXXX-YYYY.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/ca216900abd846f0220fe18b95f9f787bdbe0e87fa4eee822073cd69@%3Ccommits.openoffice.apache.org%3E" }, { "name": "[openoffice-commits] 20191124 svn commit: r1053270 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2019-9853.html content/security/cves/CVE-XXXX-YYYY.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/27339e8a9a1e9bb47fbdb939b338256d0356250a1974aaf4d774f683@%3Ccommits.openoffice.apache.org%3E" }, { "name": "[openoffice-commits] 20191124 svn commit: r1053271 - in /websites/staging/ooo-site/trunk: cgi-bin/ content/ content/security/cves/CVE-2019-9853.html content/security/cves/CVE-XXXX-YYYY.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/19c917f7c8a0d8f62142046fabfe3e2c7d6091ef1f92b99c6e79e24e@%3Ccommits.openoffice.apache.org%3E" }, { "name": "[openoffice-commits] 20191124 svn commit: r1870336 - in /openoffice/ooo-site/trunk/content/security/cves: CVE-2019-9853.html CVE-XXXX-YYYY.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/306a374361891eb17c6cffc99c3d7be1d3152a99c839d4231edc1631@%3Ccommits.openoffice.apache.org%3E" }, { "name": "openSUSE-SU-2019:2709", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00040.html" }, { "name": "20200220 Open-Xchange Security Advisory 2020-02-19", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2020/Feb/23" }, { "name": "http://packetstormsecurity.com/files/156474/Open-Xchange-App-Suite-Documents-Server-Side-Request-Forgery.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/156474/Open-Xchange-App-Suite-Documents-Server-Side-Request-Forgery.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "4fe7d05b-1353-44cc-8b7a-1e416936dff2", "assignerShortName": "Document Fdn.", "cveId": "CVE-2019-9853", "datePublished": "2019-09-27T15:07:40.492574Z", "dateReserved": "2019-03-17T00:00:00", "dateUpdated": "2024-09-16T17:17:42.379Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-9852
Vulnerability from cvelistv5
Published
2019-08-15 21:40
Modified
2024-09-17 03:42
Severity ?
EPSS score ?
Summary
LibreOffice has a feature where documents can specify that pre-installed macros can be executed on various script events such as mouse-over, document-open etc. Access is intended to be restricted to scripts under the share/Scripts/python, user/Scripts/python sub-directories of the LibreOffice install. Protection was added, to address CVE-2018-16858, to avoid a directory traversal attack where scripts in arbitrary locations on the file system could be executed. However this new protection could be bypassed by a URL encoding attack. In the fixed versions, the parsed url describing the script location is correctly encoded before further processing. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6.
References
▼ | URL | Tags |
---|---|---|
https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9852 | x_refsource_MISC | |
https://seclists.org/bugtraq/2019/Aug/28 | mailing-list, x_refsource_BUGTRAQ | |
https://www.debian.org/security/2019/dsa-4501 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PMEGUWMWORC3DOVEHVXLFT3A5RSCMLBH/ | vendor-advisory, x_refsource_FEDORA | |
https://usn.ubuntu.com/4102-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html | vendor-advisory, x_refsource_SUSE | |
https://seclists.org/bugtraq/2019/Sep/17 | mailing-list, x_refsource_BUGTRAQ | |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html | vendor-advisory, x_refsource_SUSE | |
https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html | mailing-list, x_refsource_MLIST |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Document Foundation | LibreOffice |
Version: unspecified < 6.2.6 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:01:54.996Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9852" }, { "name": "20190815 [SECURITY] [DSA 4501-1] libreoffice security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Aug/28" }, { "name": "DSA-4501", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4501" }, { "name": "FEDORA-2019-2fe22a3a2c", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PMEGUWMWORC3DOVEHVXLFT3A5RSCMLBH/" }, { "name": "USN-4102-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4102-1/" }, { "name": "openSUSE-SU-2019:2057", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html" }, { "name": "20190910 [SECURITY] [DSA 4519-1] libreoffice security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Sep/17" }, { "name": "openSUSE-SU-2019:2183", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" }, { "name": "[debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "LibreOffice", "vendor": "Document Foundation", "versions": [ { "lessThan": "6.2.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Thanks to Nils Emmerich of ERNW Research GmbH for discovering and reporting this issue" } ], "datePublic": "2019-08-15T00:00:00", "descriptions": [ { "lang": "en", "value": "LibreOffice has a feature where documents can specify that pre-installed macros can be executed on various script events such as mouse-over, document-open etc. Access is intended to be restricted to scripts under the share/Scripts/python, user/Scripts/python sub-directories of the LibreOffice install. Protection was added, to address CVE-2018-16858, to avoid a directory traversal attack where scripts in arbitrary locations on the file system could be executed. However this new protection could be bypassed by a URL encoding attack. In the fixed versions, the parsed url describing the script location is correctly encoded before further processing. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-116", "description": "CWE-116 Improper Encoding or Escaping of Output", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-06T13:06:10", "orgId": "4fe7d05b-1353-44cc-8b7a-1e416936dff2", "shortName": "Document Fdn." }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9852" }, { "name": "20190815 [SECURITY] [DSA 4501-1] libreoffice security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Aug/28" }, { "name": "DSA-4501", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4501" }, { "name": "FEDORA-2019-2fe22a3a2c", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PMEGUWMWORC3DOVEHVXLFT3A5RSCMLBH/" }, { "name": "USN-4102-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4102-1/" }, { "name": "openSUSE-SU-2019:2057", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html" }, { "name": "20190910 [SECURITY] [DSA 4519-1] libreoffice security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Sep/17" }, { "name": "openSUSE-SU-2019:2183", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" }, { "name": "[debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Insufficient URL encoding flaw in allowed script location check", "x_generator": { "engine": "Vulnogram 0.0.7" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@documentfoundation.org", "DATE_PUBLIC": "2019-08-15T00:00:00.000Z", "ID": "CVE-2019-9852", "STATE": "PUBLIC", "TITLE": "Insufficient URL encoding flaw in allowed script location check" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "LibreOffice", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "6.2.6" } ] } } ] }, "vendor_name": "Document Foundation" } ] } }, "credit": [ { "lang": "eng", "value": "Thanks to Nils Emmerich of ERNW Research GmbH for discovering and reporting this issue" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "LibreOffice has a feature where documents can specify that pre-installed macros can be executed on various script events such as mouse-over, document-open etc. Access is intended to be restricted to scripts under the share/Scripts/python, user/Scripts/python sub-directories of the LibreOffice install. Protection was added, to address CVE-2018-16858, to avoid a directory traversal attack where scripts in arbitrary locations on the file system could be executed. However this new protection could be bypassed by a URL encoding attack. In the fixed versions, the parsed url describing the script location is correctly encoded before further processing. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6." } ] }, "generator": { "engine": "Vulnogram 0.0.7" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-116 Improper Encoding or Escaping of Output" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9852", "refsource": "MISC", "url": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9852" }, { "name": "20190815 [SECURITY] [DSA 4501-1] libreoffice security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/28" }, { "name": "DSA-4501", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4501" }, { "name": "FEDORA-2019-2fe22a3a2c", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PMEGUWMWORC3DOVEHVXLFT3A5RSCMLBH/" }, { "name": "USN-4102-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4102-1/" }, { "name": "openSUSE-SU-2019:2057", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html" }, { "name": "20190910 [SECURITY] [DSA 4519-1] libreoffice security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Sep/17" }, { "name": "openSUSE-SU-2019:2183", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" }, { "name": "[debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "4fe7d05b-1353-44cc-8b7a-1e416936dff2", "assignerShortName": "Document Fdn.", "cveId": "CVE-2019-9852", "datePublished": "2019-08-15T21:40:18.556261Z", "dateReserved": "2019-03-17T00:00:00", "dateUpdated": "2024-09-17T03:42:47.414Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-9851
Vulnerability from cvelistv5
Published
2019-08-15 21:35
Modified
2024-09-16 22:03
Severity ?
EPSS score ?
Summary
LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. Protection was added, to address CVE-2019-9848, to block calling LibreLogo from document event script handers, e.g. mouse over. However LibreOffice also has a separate feature where documents can specify that pre-installed scripts can be executed on various global script events such as document-open, etc. In the fixed versions, global script event handlers are validated equivalently to document script event handlers. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6.
References
▼ | URL | Tags |
---|---|---|
https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9851 | x_refsource_CONFIRM | |
https://seclists.org/bugtraq/2019/Aug/28 | mailing-list, x_refsource_BUGTRAQ | |
https://www.debian.org/security/2019/dsa-4501 | vendor-advisory, x_refsource_DEBIAN | |
http://packetstormsecurity.com/files/154168/LibreOffice-Macro-Python-Code-Execution.html | x_refsource_MISC | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PMEGUWMWORC3DOVEHVXLFT3A5RSCMLBH/ | vendor-advisory, x_refsource_FEDORA | |
https://usn.ubuntu.com/4102-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html | vendor-advisory, x_refsource_SUSE | |
https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html | mailing-list, x_refsource_MLIST |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Document Foundation | LibreOffice |
Version: unspecified < 6.2.6 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:01:55.130Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9851" }, { "name": "20190815 [SECURITY] [DSA 4501-1] libreoffice security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Aug/28" }, { "name": "DSA-4501", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4501" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/154168/LibreOffice-Macro-Python-Code-Execution.html" }, { "name": "FEDORA-2019-2fe22a3a2c", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PMEGUWMWORC3DOVEHVXLFT3A5RSCMLBH/" }, { "name": "USN-4102-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4102-1/" }, { "name": "openSUSE-SU-2019:2057", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html" }, { "name": "openSUSE-SU-2019:2183", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" }, { "name": "[debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "LibreOffice", "vendor": "Document Foundation", "versions": [ { "lessThan": "6.2.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Thanks to Gabriel Masei of 1\u00261 for discovering and reporting this issue" } ], "datePublic": "2019-08-15T00:00:00", "descriptions": [ { "lang": "en", "value": "LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. Protection was added, to address CVE-2019-9848, to block calling LibreLogo from document event script handers, e.g. mouse over. However LibreOffice also has a separate feature where documents can specify that pre-installed scripts can be executed on various global script events such as document-open, etc. In the fixed versions, global script event handlers are validated equivalently to document script event handlers. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6." } ], "problemTypes": [ { "descriptions": [ { "description": "arbitrary script execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-06T13:06:06", "orgId": "4fe7d05b-1353-44cc-8b7a-1e416936dff2", "shortName": "Document Fdn." }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9851" }, { "name": "20190815 [SECURITY] [DSA 4501-1] libreoffice security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Aug/28" }, { "name": "DSA-4501", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4501" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/154168/LibreOffice-Macro-Python-Code-Execution.html" }, { "name": "FEDORA-2019-2fe22a3a2c", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PMEGUWMWORC3DOVEHVXLFT3A5RSCMLBH/" }, { "name": "USN-4102-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4102-1/" }, { "name": "openSUSE-SU-2019:2057", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html" }, { "name": "openSUSE-SU-2019:2183", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" }, { "name": "[debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "LibreLogo global-event script execution", "x_generator": { "engine": "Vulnogram 0.0.7" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@documentfoundation.org", "DATE_PUBLIC": "2019-08-15T00:00:00.000Z", "ID": "CVE-2019-9851", "STATE": "PUBLIC", "TITLE": "LibreLogo global-event script execution" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "LibreOffice", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "6.2.6" } ] } } ] }, "vendor_name": "Document Foundation" } ] } }, "credit": [ { "lang": "eng", "value": "Thanks to Gabriel Masei of 1\u00261 for discovering and reporting this issue" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. Protection was added, to address CVE-2019-9848, to block calling LibreLogo from document event script handers, e.g. mouse over. However LibreOffice also has a separate feature where documents can specify that pre-installed scripts can be executed on various global script events such as document-open, etc. In the fixed versions, global script event handlers are validated equivalently to document script event handlers. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6." } ] }, "generator": { "engine": "Vulnogram 0.0.7" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "arbitrary script execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9851", "refsource": "CONFIRM", "url": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9851" }, { "name": "20190815 [SECURITY] [DSA 4501-1] libreoffice security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/28" }, { "name": "DSA-4501", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4501" }, { "name": "http://packetstormsecurity.com/files/154168/LibreOffice-Macro-Python-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/154168/LibreOffice-Macro-Python-Code-Execution.html" }, { "name": "FEDORA-2019-2fe22a3a2c", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PMEGUWMWORC3DOVEHVXLFT3A5RSCMLBH/" }, { "name": "USN-4102-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4102-1/" }, { "name": "openSUSE-SU-2019:2057", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html" }, { "name": "openSUSE-SU-2019:2183", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" }, { "name": "[debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "4fe7d05b-1353-44cc-8b7a-1e416936dff2", "assignerShortName": "Document Fdn.", "cveId": "CVE-2019-9851", "datePublished": "2019-08-15T21:35:46.759573Z", "dateReserved": "2019-03-17T00:00:00", "dateUpdated": "2024-09-16T22:03:31.541Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-9854
Vulnerability from cvelistv5
Published
2019-09-06 18:30
Modified
2024-09-16 19:24
Severity ?
EPSS score ?
Summary
LibreOffice has a feature where documents can specify that pre-installed macros can be executed on various script events such as mouse-over, document-open etc. Access is intended to be restricted to scripts under the share/Scripts/python, user/Scripts/python sub-directories of the LibreOffice install. Protection was added, to address CVE-2019-9852, to avoid a directory traversal attack where scripts in arbitrary locations on the file system could be executed by employing a URL encoding attack to defeat the path verification step. However this protection could be bypassed by taking advantage of a flaw in how LibreOffice assembled the final script URL location directly from components of the passed in path as opposed to solely from the sanitized output of the path verification step. This issue affects: Document Foundation LibreOffice 6.2 versions prior to 6.2.7; 6.3 versions prior to 6.3.1.
References
▼ | URL | Tags |
---|---|---|
https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9854/ | x_refsource_CONFIRM | |
https://www.debian.org/security/2019/dsa-4519 | vendor-advisory, x_refsource_DEBIAN | |
https://seclists.org/bugtraq/2019/Sep/17 | mailing-list, x_refsource_BUGTRAQ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQKKOIY2DMZCXJINOLIQXD2NWISDKK3N/ | vendor-advisory, x_refsource_FEDORA | |
https://usn.ubuntu.com/4138-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html | vendor-advisory, x_refsource_SUSE | |
https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00055.html | vendor-advisory, x_refsource_SUSE |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Document Foundation | LibreOffice |
Version: 6.2 < 6.2.7 Version: 6.3 < 6.3.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:01:55.131Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9854/" }, { "name": "DSA-4519", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4519" }, { "name": "20190910 [SECURITY] [DSA 4519-1] libreoffice security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Sep/17" }, { "name": "FEDORA-2019-9627e1402e", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQKKOIY2DMZCXJINOLIQXD2NWISDKK3N/" }, { "name": "USN-4138-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4138-1/" }, { "name": "openSUSE-SU-2019:2183", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" }, { "name": "[debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html" }, { "name": "openSUSE-SU-2019:2361", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00055.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "LibreOffice", "vendor": "Document Foundation", "versions": [ { "lessThan": "6.2.7", "status": "affected", "version": "6.2", "versionType": "custom" }, { "lessThan": "6.3.1", "status": "affected", "version": "6.3", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Thanks to RiceX(@ricex_cc) for reporting this issue" } ], "datePublic": "2019-09-06T00:00:00", "descriptions": [ { "lang": "en", "value": "LibreOffice has a feature where documents can specify that pre-installed macros can be executed on various script events such as mouse-over, document-open etc. Access is intended to be restricted to scripts under the share/Scripts/python, user/Scripts/python sub-directories of the LibreOffice install. Protection was added, to address CVE-2019-9852, to avoid a directory traversal attack where scripts in arbitrary locations on the file system could be executed by employing a URL encoding attack to defeat the path verification step. However this protection could be bypassed by taking advantage of a flaw in how LibreOffice assembled the final script URL location directly from components of the passed in path as opposed to solely from the sanitized output of the path verification step. This issue affects: Document Foundation LibreOffice 6.2 versions prior to 6.2.7; 6.3 versions prior to 6.3.1." } ], "problemTypes": [ { "descriptions": [ { "description": "Unsafe URL assembly flaw in allowed script location check", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-22T05:03:54", "orgId": "4fe7d05b-1353-44cc-8b7a-1e416936dff2", "shortName": "Document Fdn." }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9854/" }, { "name": "DSA-4519", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4519" }, { "name": "20190910 [SECURITY] [DSA 4519-1] libreoffice security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Sep/17" }, { "name": "FEDORA-2019-9627e1402e", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQKKOIY2DMZCXJINOLIQXD2NWISDKK3N/" }, { "name": "USN-4138-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4138-1/" }, { "name": "openSUSE-SU-2019:2183", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" }, { "name": "[debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html" }, { "name": "openSUSE-SU-2019:2361", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00055.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Unsafe URL assembly flaw in allowed script location check", "x_generator": { "engine": "Vulnogram 0.0.7" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@documentfoundation.org", "DATE_PUBLIC": "2019-09-06T00:00:00.000Z", "ID": "CVE-2019-9854", "STATE": "PUBLIC", "TITLE": "Unsafe URL assembly flaw in allowed script location check" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "LibreOffice", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "6.2", "version_value": "6.2.7" }, { "version_affected": "\u003c", "version_name": "6.3", "version_value": "6.3.1" } ] } } ] }, "vendor_name": "Document Foundation" } ] } }, "credit": [ { "lang": "eng", "value": "Thanks to RiceX(@ricex_cc) for reporting this issue" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "LibreOffice has a feature where documents can specify that pre-installed macros can be executed on various script events such as mouse-over, document-open etc. Access is intended to be restricted to scripts under the share/Scripts/python, user/Scripts/python sub-directories of the LibreOffice install. Protection was added, to address CVE-2019-9852, to avoid a directory traversal attack where scripts in arbitrary locations on the file system could be executed by employing a URL encoding attack to defeat the path verification step. However this protection could be bypassed by taking advantage of a flaw in how LibreOffice assembled the final script URL location directly from components of the passed in path as opposed to solely from the sanitized output of the path verification step. This issue affects: Document Foundation LibreOffice 6.2 versions prior to 6.2.7; 6.3 versions prior to 6.3.1." } ] }, "generator": { "engine": "Vulnogram 0.0.7" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unsafe URL assembly flaw in allowed script location check" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9854/", "refsource": "CONFIRM", "url": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9854/" }, { "name": "DSA-4519", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4519" }, { "name": "20190910 [SECURITY] [DSA 4519-1] libreoffice security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Sep/17" }, { "name": "FEDORA-2019-9627e1402e", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XQKKOIY2DMZCXJINOLIQXD2NWISDKK3N/" }, { "name": "USN-4138-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4138-1/" }, { "name": "openSUSE-SU-2019:2183", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" }, { "name": "[debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html" }, { "name": "openSUSE-SU-2019:2361", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00055.html" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "4fe7d05b-1353-44cc-8b7a-1e416936dff2", "assignerShortName": "Document Fdn.", "cveId": "CVE-2019-9854", "datePublished": "2019-09-06T18:30:08.910063Z", "dateReserved": "2019-03-17T00:00:00", "dateUpdated": "2024-09-16T19:24:19.650Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-9855
Vulnerability from cvelistv5
Published
2019-09-06 18:40
Modified
2024-09-16 18:49
Severity ?
EPSS score ?
Summary
LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. LibreOffice also has a feature where documents can specify that pre-installed scripts can be executed on various document script events such as mouse-over, etc. Protection was added to block calling LibreLogo from script event handers. However a Windows 8.3 path equivalence handling flaw left LibreOffice vulnerable under Windows that a document could trigger executing LibreLogo via a Windows filename pseudonym. This issue affects: Document Foundation LibreOffice 6.2 versions prior to 6.2.7; 6.3 versions prior to 6.3.1.
References
▼ | URL | Tags |
---|---|---|
https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9855/ | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00055.html | vendor-advisory, x_refsource_SUSE |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Document Foundation | LibreOffice |
Version: 6.2 < 6.2.7 Version: 6.3 < 6.3.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:01:55.101Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9855/" }, { "name": "openSUSE-SU-2019:2183", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" }, { "name": "openSUSE-SU-2019:2361", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00055.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "LibreOffice", "vendor": "Document Foundation", "versions": [ { "lessThan": "6.2.7", "status": "affected", "version": "6.2", "versionType": "custom" }, { "lessThan": "6.3.1", "status": "affected", "version": "6.3", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Thanks to alex (@insertscript) for reporting this issue" } ], "datePublic": "2019-09-06T00:00:00", "descriptions": [ { "lang": "en", "value": "LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. LibreOffice also has a feature where documents can specify that pre-installed scripts can be executed on various document script events such as mouse-over, etc. Protection was added to block calling LibreLogo from script event handers. However a Windows 8.3 path equivalence handling flaw left LibreOffice vulnerable under Windows that a document could trigger executing LibreLogo via a Windows filename pseudonym. This issue affects: Document Foundation LibreOffice 6.2 versions prior to 6.2.7; 6.3 versions prior to 6.3.1." } ], "problemTypes": [ { "descriptions": [ { "description": "Windows 8.3 path equivalence handling flaw", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-22T05:03:53", "orgId": "4fe7d05b-1353-44cc-8b7a-1e416936dff2", "shortName": "Document Fdn." }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9855/" }, { "name": "openSUSE-SU-2019:2183", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" }, { "name": "openSUSE-SU-2019:2361", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00055.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Windows 8.3 path equivalence handling flaw allows LibreLogo script execution", "x_generator": { "engine": "Vulnogram 0.0.7" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@documentfoundation.org", "DATE_PUBLIC": "2019-09-06T00:00:00.000Z", "ID": "CVE-2019-9855", "STATE": "PUBLIC", "TITLE": "Windows 8.3 path equivalence handling flaw allows LibreLogo script execution" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "LibreOffice", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "6.2", "version_value": "6.2.7" }, { "version_affected": "\u003c", "version_name": "6.3", "version_value": "6.3.1" } ] } } ] }, "vendor_name": "Document Foundation" } ] } }, "credit": [ { "lang": "eng", "value": "Thanks to alex (@insertscript) for reporting this issue" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. LibreOffice also has a feature where documents can specify that pre-installed scripts can be executed on various document script events such as mouse-over, etc. Protection was added to block calling LibreLogo from script event handers. However a Windows 8.3 path equivalence handling flaw left LibreOffice vulnerable under Windows that a document could trigger executing LibreLogo via a Windows filename pseudonym. This issue affects: Document Foundation LibreOffice 6.2 versions prior to 6.2.7; 6.3 versions prior to 6.3.1." } ] }, "generator": { "engine": "Vulnogram 0.0.7" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Windows 8.3 path equivalence handling flaw" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9855/", "refsource": "CONFIRM", "url": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9855/" }, { "name": "openSUSE-SU-2019:2183", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" }, { "name": "openSUSE-SU-2019:2361", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00055.html" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "4fe7d05b-1353-44cc-8b7a-1e416936dff2", "assignerShortName": "Document Fdn.", "cveId": "CVE-2019-9855", "datePublished": "2019-09-06T18:40:17.271099Z", "dateReserved": "2019-03-17T00:00:00", "dateUpdated": "2024-09-16T18:49:33.756Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-9850
Vulnerability from cvelistv5
Published
2019-08-15 21:30
Modified
2024-09-16 16:47
Severity ?
EPSS score ?
Summary
LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. LibreOffice also has a feature where documents can specify that pre-installed scripts can be executed on various document script events such as mouse-over, etc. Protection was added, to address CVE-2019-9848, to block calling LibreLogo from script event handers. However an insufficient url validation vulnerability in LibreOffice allowed malicious to bypass that protection and again trigger calling LibreLogo from script event handlers. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6.
References
▼ | URL | Tags |
---|---|---|
https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9850 | x_refsource_CONFIRM | |
https://seclists.org/bugtraq/2019/Aug/28 | mailing-list, x_refsource_BUGTRAQ | |
https://www.debian.org/security/2019/dsa-4501 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WVSDPZJG3UA43X3JXRHJAWXLDZEW77LM/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PMEGUWMWORC3DOVEHVXLFT3A5RSCMLBH/ | vendor-advisory, x_refsource_FEDORA | |
https://usn.ubuntu.com/4102-1/ | vendor-advisory, x_refsource_UBUNTU | |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html | vendor-advisory, x_refsource_SUSE | |
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html | vendor-advisory, x_refsource_SUSE | |
https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html | mailing-list, x_refsource_MLIST |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Document Foundation | LibreOffice |
Version: unspecified < 6.2.6 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:01:54.958Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9850" }, { "name": "20190815 [SECURITY] [DSA 4501-1] libreoffice security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Aug/28" }, { "name": "DSA-4501", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2019/dsa-4501" }, { "name": "FEDORA-2019-dd9d207c17", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WVSDPZJG3UA43X3JXRHJAWXLDZEW77LM/" }, { "name": "FEDORA-2019-2fe22a3a2c", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PMEGUWMWORC3DOVEHVXLFT3A5RSCMLBH/" }, { "name": "USN-4102-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4102-1/" }, { "name": "openSUSE-SU-2019:2057", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html" }, { "name": "openSUSE-SU-2019:2183", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" }, { "name": "[debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "LibreOffice", "vendor": "Document Foundation", "versions": [ { "lessThan": "6.2.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Thanks to alex (@insertscript) for reporting this issue" } ], "datePublic": "2019-08-15T00:00:00", "descriptions": [ { "lang": "en", "value": "LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. LibreOffice also has a feature where documents can specify that pre-installed scripts can be executed on various document script events such as mouse-over, etc. Protection was added, to address CVE-2019-9848, to block calling LibreLogo from script event handers. However an insufficient url validation vulnerability in LibreOffice allowed malicious to bypass that protection and again trigger calling LibreLogo from script event handlers. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6." } ], "problemTypes": [ { "descriptions": [ { "description": "Insufficient url validation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-06T13:06:05", "orgId": "4fe7d05b-1353-44cc-8b7a-1e416936dff2", "shortName": "Document Fdn." }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9850" }, { "name": "20190815 [SECURITY] [DSA 4501-1] libreoffice security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Aug/28" }, { "name": "DSA-4501", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2019/dsa-4501" }, { "name": "FEDORA-2019-dd9d207c17", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WVSDPZJG3UA43X3JXRHJAWXLDZEW77LM/" }, { "name": "FEDORA-2019-2fe22a3a2c", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PMEGUWMWORC3DOVEHVXLFT3A5RSCMLBH/" }, { "name": "USN-4102-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4102-1/" }, { "name": "openSUSE-SU-2019:2057", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html" }, { "name": "openSUSE-SU-2019:2183", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" }, { "name": "[debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html" } ], "source": { "discovery": "EXTERNAL" }, "title": "Insufficient url validation allowing LibreLogo script execution", "x_generator": { "engine": "Vulnogram 0.0.7" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@documentfoundation.org", "DATE_PUBLIC": "2019-08-15T00:00:00.000Z", "ID": "CVE-2019-9850", "STATE": "PUBLIC", "TITLE": "Insufficient url validation allowing LibreLogo script execution" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "LibreOffice", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "6.2.6" } ] } } ] }, "vendor_name": "Document Foundation" } ] } }, "credit": [ { "lang": "eng", "value": "Thanks to alex (@insertscript) for reporting this issue" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. LibreOffice also has a feature where documents can specify that pre-installed scripts can be executed on various document script events such as mouse-over, etc. Protection was added, to address CVE-2019-9848, to block calling LibreLogo from script event handers. However an insufficient url validation vulnerability in LibreOffice allowed malicious to bypass that protection and again trigger calling LibreLogo from script event handlers. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6." } ] }, "generator": { "engine": "Vulnogram 0.0.7" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insufficient url validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9850", "refsource": "CONFIRM", "url": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9850" }, { "name": "20190815 [SECURITY] [DSA 4501-1] libreoffice security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/28" }, { "name": "DSA-4501", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2019/dsa-4501" }, { "name": "FEDORA-2019-dd9d207c17", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WVSDPZJG3UA43X3JXRHJAWXLDZEW77LM/" }, { "name": "FEDORA-2019-2fe22a3a2c", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PMEGUWMWORC3DOVEHVXLFT3A5RSCMLBH/" }, { "name": "USN-4102-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4102-1/" }, { "name": "openSUSE-SU-2019:2057", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html" }, { "name": "openSUSE-SU-2019:2183", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" }, { "name": "[debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "4fe7d05b-1353-44cc-8b7a-1e416936dff2", "assignerShortName": "Document Fdn.", "cveId": "CVE-2019-9850", "datePublished": "2019-08-15T21:30:42.285992Z", "dateReserved": "2019-03-17T00:00:00", "dateUpdated": "2024-09-16T16:47:47.975Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2019-9848
Vulnerability from cvelistv5
Published
2019-07-17 11:21
Modified
2024-09-16 22:50
Severity ?
EPSS score ?
Summary
LibreOffice has a feature where documents can specify that pre-installed scripts can be executed on various document events such as mouse-over, etc. LibreOffice is typically also bundled with LibreLogo, a programmable turtle vector graphics script, which can be manipulated into executing arbitrary python commands. By using the document event feature to trigger LibreLogo to execute python contained within a document a malicious document could be constructed which would execute arbitrary python commands silently without warning. In the fixed versions, LibreLogo cannot be called from a document event handler. This issue affects: Document Foundation LibreOffice versions prior to 6.2.5.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Document Foundation | LibreOffice |
Version: unspecified < 6.2.5 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:01:54.965Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9848" }, { "name": "USN-4063-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4063-1/" }, { "name": "FEDORA-2019-5561d20558", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XPTZJCNN52VNGSVC5DFKVW3EDMRDWKMP/" }, { "name": "109374", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/109374" }, { "name": "GLSA-201908-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201908-13" }, { "name": "20190815 [SECURITY] [DSA 4501-1] libreoffice security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Aug/28" }, { "name": "FEDORA-2019-2fe22a3a2c", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PMEGUWMWORC3DOVEHVXLFT3A5RSCMLBH/" }, { "name": "openSUSE-SU-2019:2057", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html" }, { "name": "openSUSE-SU-2019:2183", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" }, { "name": "[debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "LibreOffice", "vendor": "Document Foundation", "versions": [ { "lessThan": "6.2.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Thanks to Nils Emmerich of ERNW Research GmbH for discovering and reporting this issue" } ], "datePublic": "2019-07-16T00:00:00", "descriptions": [ { "lang": "en", "value": "LibreOffice has a feature where documents can specify that pre-installed scripts can be executed on various document events such as mouse-over, etc. LibreOffice is typically also bundled with LibreLogo, a programmable turtle vector graphics script, which can be manipulated into executing arbitrary python commands. By using the document event feature to trigger LibreLogo to execute python contained within a document a malicious document could be constructed which would execute arbitrary python commands silently without warning. In the fixed versions, LibreLogo cannot be called from a document event handler. This issue affects: Document Foundation LibreOffice versions prior to 6.2.5." } ], "problemTypes": [ { "descriptions": [ { "description": "LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which could be leveraged to by an attacker document to silently execute arbitrary python commands", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-06T13:06:08", "orgId": "4fe7d05b-1353-44cc-8b7a-1e416936dff2", "shortName": "Document Fdn." }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9848" }, { "name": "USN-4063-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4063-1/" }, { "name": "FEDORA-2019-5561d20558", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XPTZJCNN52VNGSVC5DFKVW3EDMRDWKMP/" }, { "name": "109374", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/109374" }, { "name": "GLSA-201908-13", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201908-13" }, { "name": "20190815 [SECURITY] [DSA 4501-1] libreoffice security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Aug/28" }, { "name": "FEDORA-2019-2fe22a3a2c", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PMEGUWMWORC3DOVEHVXLFT3A5RSCMLBH/" }, { "name": "openSUSE-SU-2019:2057", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html" }, { "name": "openSUSE-SU-2019:2183", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" }, { "name": "[debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html" } ], "source": { "defect": [ "LibreLogo", "arbitrary", "script", "execution" ], "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.7" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@documentfoundation.org", "DATE_PUBLIC": "2019-07-16T00:00:00.000Z", "ID": "CVE-2019-9848", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "LibreOffice", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "6.2.5" } ] } } ] }, "vendor_name": "Document Foundation" } ] } }, "credit": [ { "lang": "eng", "value": "Thanks to Nils Emmerich of ERNW Research GmbH for discovering and reporting this issue" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "LibreOffice has a feature where documents can specify that pre-installed scripts can be executed on various document events such as mouse-over, etc. LibreOffice is typically also bundled with LibreLogo, a programmable turtle vector graphics script, which can be manipulated into executing arbitrary python commands. By using the document event feature to trigger LibreLogo to execute python contained within a document a malicious document could be constructed which would execute arbitrary python commands silently without warning. In the fixed versions, LibreLogo cannot be called from a document event handler. This issue affects: Document Foundation LibreOffice versions prior to 6.2.5." } ] }, "generator": { "engine": "Vulnogram 0.0.7" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which could be leveraged to by an attacker document to silently execute arbitrary python commands" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9848", "refsource": "CONFIRM", "url": "https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9848" }, { "name": "USN-4063-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4063-1/" }, { "name": "FEDORA-2019-5561d20558", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPTZJCNN52VNGSVC5DFKVW3EDMRDWKMP/" }, { "name": "109374", "refsource": "BID", "url": "http://www.securityfocus.com/bid/109374" }, { "name": "GLSA-201908-13", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201908-13" }, { "name": "20190815 [SECURITY] [DSA 4501-1] libreoffice security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Aug/28" }, { "name": "FEDORA-2019-2fe22a3a2c", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PMEGUWMWORC3DOVEHVXLFT3A5RSCMLBH/" }, { "name": "openSUSE-SU-2019:2057", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00006.html" }, { "name": "openSUSE-SU-2019:2183", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html" }, { "name": "[debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00005.html" } ] }, "source": { "defect": [ "LibreLogo", "arbitrary", "script", "execution" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "4fe7d05b-1353-44cc-8b7a-1e416936dff2", "assignerShortName": "Document Fdn.", "cveId": "CVE-2019-9848", "datePublished": "2019-07-17T11:21:57.813188Z", "dateReserved": "2019-03-17T00:00:00", "dateUpdated": "2024-09-16T22:50:55.703Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }