// For flags

CVE-2024-3044

Graphic on-click binding allows unchecked script execution

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

Unchecked script execution in Graphic on-click binding in affected LibreOffice versions allows an attacker to create a document which without prompt will execute scripts built-into LibreOffice on clicking a graphic. Such scripts were previously deemed trusted but are now deemed untrusted.

La ejecución de script sin marcar en el enlace gráfico al hacer clic en las versiones afectadas de LibreOffice permite a un atacante crear un documento que, sin aviso, ejecutará script integradas en LibreOffice al hacer clic en un gráfico. Anteriormente, estos scripts se consideraban confiables, pero ahora se consideran no confiables.

A flaw was found in LibreOffice. Unchecked script execution in graphic on-click binding allows an attacker to create a document, which, without a prompt, will execute scripts built into LibreOffice when clicking a graphic. These scripts were previously deemed trusted but are now deemed untrusted.

*Credits: Thanks to Amel Bouziane-Leblond for for finding and reporting this issue.
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
Low
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-03-28 CVE Reserved
  • 2024-05-14 CVE Published
  • 2024-06-11 EPSS Updated
  • 2024-11-12 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
  • CWE-356: Product UI does not Warn User of Unsafe Actions
CAPEC
  • CAPEC-160: Exploit Script-Based APIs
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
The Document Foundation
Search vendor "The Document Foundation"
LibreOffice
Search vendor "The Document Foundation" for product "LibreOffice"
>= 7.6.0 < 7.6.7
Search vendor "The Document Foundation" for product "LibreOffice" and version " >= 7.6.0 < 7.6.7"
en
Affected
The Document Foundation
Search vendor "The Document Foundation"
LibreOffice
Search vendor "The Document Foundation" for product "LibreOffice"
>= 24.2.0 < 24.2.3
Search vendor "The Document Foundation" for product "LibreOffice" and version " >= 24.2.0 < 24.2.3"
en
Affected