<!--X-Body-Begin-->
<!--X-User-Header-->
oss-sec
mailing list archives
<!--X-User-Header-End-->
<!--X-TopPNI-->
By Date
By Thread
</form>
<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
CVE-2023-1183: Apache OpenOffice: Arbitrary file write in Apache OpenOffice Base
<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->
From: Arrigo Marchiori <ardovm () apache org>
Date: Thu, 28 Dec 2023 21:55:38 +0100
<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->
<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
Severity: Moderate
Affected versions:
- Apache OpenOffice through 4.1.15
Description:
An attacker can craft an OBD containing a "database/script" file with
a SCRIPT command where the contents of the file could be written to a
new file whose location was determined by the attacker.
There are no known exploits of this vulnerability.
A proof-of-concept demonstration exists.
Thanks to the reporter for discovering this issue.
Credit:
The Apache OpenOffice Security Team would like to thank Gregor Kopf of Secfault Security GmbH (Germany) for discovering
and reporting this attack vector and Fred Toussi for kindly providing a solution to this issue within HSQLDB.
References:
https://openoffice.apache.org/
https://www.cve.org/CVERecord?id=CVE-2023-1183
--
Arrigo
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->
By Date
By Thread
Current thread:
CVE-2023-1183: Apache OpenOffice: Arbitrary file write in Apache OpenOffice Base Arrigo Marchiori (Dec 28)
<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->