LibreOffice 6.2.6 / 6.3.1 Security Control Bypass (Windows)

high Nessus Plugin ID 133471

Synopsis

An issue with how LibreOffice handles URL decoding can lead to the execution of macros that would otherwise be restricted by inbuilt access controls.

Description

According to its self-reported version, the LibreOffice application running on the remote host is prior to 6.2.6.
It is, therefore, affected by a flaw in how LibreOffice sanitizes user supplied input when decoding URL encoded characters in the macro location. This can result in macros within a document to be executed without the users knowledge.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to LibreOffice version 6.2.6, 6.3.1 or later.

See Also

http://www.nessus.org/u?be7c8066

Plugin Details

Severity: High

ID: 133471

File Name: libreoffice_631_cve_2019_9853.nasl

Version: 1.3

Type: local

Agent: windows

Family: Windows

Published: 2/5/2020

Updated: 3/27/2020

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2019-9853

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:libreoffice:libreoffice

Required KB Items: SMB/Registry/Enumerated, installed_sw/LibreOffice

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/28/2019

Vulnerability Publication Date: 9/27/2019

Reference Information

CVE: CVE-2019-9853