CVE-2020-13958 Unrestricted actions leads to arbitrary code execution in 
crafted documents

Fixed in Apache OpenOffice 4.1.8

Description

A vulnerability in Apache OpenOffice scripting events allows an attacker to 
construct 
documents containing hyperlinks pointing to an executable on the target users 
file system.
These hyperlinks can be triggered unconditionally. In fixed versions no 
internal protocol 
may be called from the document event handler and other hyperlinks require a 
control-click.

Severity: Low

There are no known exploits of this vulnerability.
A proof-of-concept demonstration exists.

Vendor: The Apache Software Foundation

Versions Affected

Apache OpenOffice 4.0.0, 4.0.1, 4.1.0, 4.1.1, 4.1.2, 4.1.3, 4.1.4, 4.1.5, 
4.1.6, and 4.1.7
OpenOffice.org versions may also be affected.

Mitigation

Install Apache OpenOffice 4.1.8 for the latest maintenance and cumulative 
security fixes.
Use the Apache OpenOffice download page (https://www.openoffice.org/download/).

Acknowledgments

The Apache OpenOffice Security Team would like to thank Imre Rad for 
discovering and
reporting this attack vector.

Further Information

For additional information and assistance, consult the Apache OpenOffice 
Community Forums
(https://forum.openoffice.org) or make requests to the 
us...@openoffice.apache.org
(mailto:us...@openoffice.apache.org) public mailing list.

The latest information on Apache OpenOffice security bulletins can be found at 
the
Bulletin Archive page (https://www.openoffice.org/security/bulletin.html).


---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@openoffice.apache.org
For additional commands, e-mail: dev-h...@openoffice.apache.org

Reply via email to