<!--X-Body-Begin-->
<!--X-User-Header-->
oss-sec
mailing list archives
<!--X-User-Header-End-->
<!--X-TopPNI-->
By Date
By Thread
</form>
<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
CVE-2023-47804: Apache OpenOffice: Macro URL arbitrary script execution
<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->
From: Arrigo Marchiori <ardovm () apache org>
Date: Thu, 28 Dec 2023 20:30:33 +0000
<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->
<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
Severity: important
Affected versions:
- Apache OpenOffice through 4.1.15
Description:
Apache OpenOffice documents can contain links that call internal macros with arbitrary arguments. Several URI Schemes
are defined for this purpose.
Links can be activated by clicks, or by automatic document events.
The execution of such links must be subject to user approval.
In the affected versions of OpenOffice, approval for certain links is not requested; when activated, such links could
therefore result in arbitrary script execution.
This is a corner case of CVE-2022-47502.
Credit:
Amel BOUZIANE-LEBLOND aka Icare Bug Bounty Hunter (reporter)
References:
https://openoffice.apache.org/
https://www.cve.org/CVERecord?id=CVE-2023-47804
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->
By Date
By Thread
Current thread:
CVE-2023-47804: Apache OpenOffice: Macro URL arbitrary script execution Arrigo Marchiori (Dec 28)
<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->