CVE-2023-47804: Apache OpenOffice: Macro URL arbitrary script execution

Related Vulnerabilities: CVE-2023-47804   CVE-2022-47502  
                							

                <!--X-Body-Begin-->
<!--X-User-Header-->

oss-sec
mailing list archives
<!--X-User-Header-End-->
<!--X-TopPNI-->

By Date

By Thread

</form>

<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
CVE-2023-47804: Apache OpenOffice: Macro URL arbitrary script execution

<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->

From: Arrigo Marchiori &lt;ardovm () apache org&gt;

Date: Thu, 28 Dec 2023 20:30:33 +0000

<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->

<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
Severity: important

Affected versions:

- Apache OpenOffice through 4.1.15

Description:

Apache OpenOffice documents can contain links that call internal macros with arbitrary arguments. Several URI Schemes 
are defined for this purpose.

Links can be activated by clicks, or by automatic document events.

The execution of such links must be subject to user approval.

In the affected versions of OpenOffice, approval for certain links is not requested; when activated, such links could 
therefore result in arbitrary script execution.

This is a corner case of CVE-2022-47502.

Credit:

Amel BOUZIANE-LEBLOND aka Icare Bug Bounty Hunter (reporter)

References:

https://openoffice.apache.org/
https://www.cve.org/CVERecord?id=CVE-2023-47804

<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->

<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->

By Date

By Thread

Current thread:

CVE-2023-47804: Apache OpenOffice: Macro URL arbitrary script execution Arrigo Marchiori (Dec 28)

<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->