Apache OpenOffice Macro Call Link RCE via Unapproved URI Schemes
CVE-2022-47502 Published on March 24, 2023
Apache OpenOffice: Macro URL arbitrary script execution
Apache OpenOffice documents can contain links that call internal macros with arbitrary arguments. Several URI Schemes are defined for this purpose.
Links can be activated by clicks, or by automatic document events.
The execution of such links must be subject to user approval.
In the affected versions of OpenOffice, approval for certain links is not requested; when activated, such links could therefore result in arbitrary script execution.
Weakness Types
Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
What is an Argument Injection Vulnerability?
The software constructs a string for a command to executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.
CVE-2022-47502 has been classified to as an Argument Injection vulnerability or weakness.
Products Associated with CVE-2022-47502
Want to know whenever a new CVE is published for Apache OpenOffice? stack.watch will email you.
Affected Versions
Apache Software Foundation Apache OpenOffice:- Before and including 4.1.13 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.