Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <ZZUiHKyFw0WUBc_F@nuvolo>
Date: Wed, 3 Jan 2024 10:00:12 +0100
From: Arrigo Marchiori <ardovm@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2023-47804: Apache OpenOffice: Macro URL arbitrary script
 execution

*** This announcement is a correction to the one sent on 28 December 2023.
*** The "Affected versions" information was wrong.

Severity: important

Affected versions:

- Apache OpenOffice through 4.1.14

Description:

Apache OpenOffice documents can contain links that call internal macros with arbitrary arguments. Several URI Schemes are defined for this purpose.

Links can be activated by clicks, or by automatic document events.

The execution of such links must be subject to user approval.

In the affected versions of OpenOffice, approval for certain links is not requested; when activated, such links could therefore result in arbitrary script execution.

This is a corner case of CVE-2022-47502.

Credit:

Amel BOUZIANE-LEBLOND aka Icare Bug Bounty Hunter (reporter)

References:

https://openoffice.apache.org/
https://www.cve.org/CVERecord?id=CVE-2023-47804
-- 
Arrigo

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.