Apache OpenOffice: Vulnerable Macro URI Links Allow Unapproved Script Exec
CVE-2023-47804 Published on December 29, 2023

Apache OpenOffice: Macro URL arbitrary script execution
Apache OpenOffice documents can contain links that call internal macros with arbitrary arguments. Several URI Schemes are defined for this purpose. Links can be activated by clicks, or by automatic document events. The execution of such links must be subject to user approval. In the affected versions of OpenOffice, approval for certain links is not requested; when activated, such links could therefore result in arbitrary script execution. This is a corner case of CVE-2022-47502.

Vendor Advisory NVD

Weakness Types

Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

What is an Argument Injection Vulnerability?

The software constructs a string for a command to executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string.

CVE-2023-47804 has been classified to as an Argument Injection vulnerability or weakness.


Products Associated with CVE-2023-47804

Want to know whenever a new CVE is published for Apache OpenOffice? stack.watch will email you.

 

Affected Versions

Apache Software Foundation Apache OpenOffice:

Exploit Probability

EPSS
3.01%
Percentile
86.42%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.