CVE-2019-9852
Published: 15 August 2019
LibreOffice has a feature where documents can specify that pre-installed macros can be executed on various script events such as mouse-over, document-open etc. Access is intended to be restricted to scripts under the share/Scripts/python, user/Scripts/python sub-directories of the LibreOffice install. Protection was added, to address CVE-2018-16858, to avoid a directory traversal attack where scripts in arbitrary locations on the file system could be executed. However this new protection could be bypassed by a URL encoding attack. In the fixed versions, the parsed url describing the script location is correctly encoded before further processing. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6.
CVSS 3 base score: 9.8
Status
Package | Release | Status |
---|---|---|
libreoffice Launchpad, Ubuntu, Debian |
Upstream |
Released
(1:6.3.0-1)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(1:6.0.7-0ubuntu0.18.04.9)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(1:5.1.6~rc2-0ubuntu1~xenial9)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9852
- https://www.libreoffice.org/about-us/security/advisories/cve-2019-9852/
- https://seclists.org/bugtraq/2019/Aug/28
- https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9852
- https://usn.ubuntu.com/usn/usn-4102-1
- NVD
- Launchpad
- Debian