Apache OpenOffice: Vulnerable Macro URI Links Allow Unapproved Script Exec
CVE-2023-47804 Published on December 29, 2023
Apache OpenOffice: Macro URL arbitrary script execution
Apache OpenOffice documents can contain links that call internal macros with arbitrary arguments. Several URI Schemes are defined for this purpose.
Links can be activated by clicks, or by automatic document events.
The execution of such links must be subject to user approval.
In the affected versions of OpenOffice, approval for certain links is not requested; when activated, such links could therefore result in arbitrary script execution.
This is a corner case of CVE-2022-47502.
Weakness Types
Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
What is an Argument Injection Vulnerability?
The software constructs a string for a command to executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.
CVE-2023-47804 has been classified to as an Argument Injection vulnerability or weakness.
Products Associated with CVE-2023-47804
Want to know whenever a new CVE is published for Apache OpenOffice? stack.watch will email you.
Affected Versions
Apache Software Foundation Apache OpenOffice:- Before and including 4.1.14 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.