CVE-2020-12803
XForms submissions could overwrite local files
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
ODF documents can contain forms to be filled out by the user. Similar to HTML forms, the contained form data can be submitted to a URI, for example, to an external web server. To create submittable forms, ODF implements the XForms W3C standard, which allows data to be submitted without the need for macros or other active scripting Prior to version 6.4.4 LibreOffice allowed forms to be submitted to any URI, including file: URIs, enabling form submissions to overwrite local files. User-interaction is required to submit the form, but to avoid the possibility of malicious documents engineered to maximize the possibility of inadvertent user submission this feature has now been limited to http[s] URIs, removing the possibility to overwrite local files. This issue affects: The Document Foundation LibreOffice versions prior to 6.4.4.
Los documentos ODF pueden contener formularios para ser completados por parte del usuario. De manera similar a los formularios HTML, los datos del formulario contenido pueden ser enviados hacia un URI, por ejemplo, hacia un servidor web externo. Para crear formularios enviables, ODF implementa el estándar XForms W3C, que permite el envío de datos sin la necesidad de macros u otro scripting activo. LibreOffice versiones anteriores a 6.4.4 permitió que formularios sean enviados hacia cualquier URI, incluyendo los URI file:, permitiendo envíos de formularios para sobrescribir archivos locales. Una interacción del usuario es requerida para enviar el formulario, pero para evitar la posibilidad de documentos maliciosos diseñados para maximizar la posibilidad de envío involuntario del usuario, esta característica ahora se ha limitado a los URI http[s], eliminando la posibilidad de sobrescribir archivos locales. Este problema afecta: Document Foundation LibreOffice versiones anteriores a 6.4.4
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-05-12 CVE Reserved
- 2020-06-08 CVE Published
- 2024-04-12 EPSS Updated
- 2024-09-16 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
- CWE-284: Improper Access Control
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Libreoffice Search vendor "Libreoffice" | Libreoffice Search vendor "Libreoffice" for product "Libreoffice" | < 6.4.4 Search vendor "Libreoffice" for product "Libreoffice" and version " < 6.4.4" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Leap Search vendor "Opensuse" for product "Leap" | 15.1 Search vendor "Opensuse" for product "Leap" and version "15.1" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 31 Search vendor "Fedoraproject" for product "Fedora" and version "31" | - |
Affected
|