CVE-2022-3140
CVSS V2 None
CVSS V3 Medium 6.3
Description
LibreOffice supports Office URI Schemes to enable browser integration of LibreOffice with MS SharePoint server. An additional scheme 'vnd.libreoffice.command' specific to LibreOffice was added. In the affected versions of LibreOffice links using that scheme could be constructed to call internal macros with arbitrary arguments. Which when clicked on, or activated by document events, could result in arbitrary script execution without warning. This issue affects: The Document Foundation LibreOffice 7.4 versions prior to 7.4.1; 7.3 versions prior to 7.3.6.
Overview
- CVE ID
- CVE-2022-3140
- Assigner
- security@documentfoundation.org
- Vulnerability Status
- Modified
- Published Version
- 2022-10-11T21:15:16
- Last Modified Date
- 2023-03-27T00:15:07
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:libreoffice:libreoffice:*:*:*:*:*:*:*:* | 1 | OR | 7.3.0 | 7.3.6 |
cpe:2.3:a:libreoffice:libreoffice:7.4.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- REQUIRED
- Scope
- UNCHANGED
- Confidentiality Impact
- LOW
- Availability Impact
- LOW
- Base Score
- 6.3
- Base Severity
- MEDIUM
- Exploitability Score
- 2.8
- Impact Score
- 3.4
References
Reference URL | Reference Tags |
---|---|
https://lists.debian.org/debian-lts-announce/2023/03/msg00022.html | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TORANVTIWWBH3DNJR4UZATAG67KZOH32/ | |
https://security.gentoo.org/glsa/202212-04 | Third Party Advisory |
https://www.debian.org/security/2022/dsa-5252 | Third Party Advisory |
https://www.libreoffice.org/about-us/security/advisories/CVE-2022-3140 | Vendor Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-3140 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3140 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-10-11 22:01:13 | Added to TrackCVE | |||
2022-12-07 06:32:21 | 2022-10-11T21:15Z | 2022-10-11T21:15:16 | CVE Published Date | updated |
2022-12-07 06:32:21 | 2022-11-07T14:44:46 | CVE Modified Date | updated | |
2022-12-07 06:32:21 | Analyzed | Vulnerability Status | updated | |
2022-12-07 06:32:32 | References | updated | ||
2022-12-19 04:27:56 | 2022-12-19T04:15:15 | CVE Modified Date | updated | |
2022-12-19 04:27:56 | Analyzed | Modified | Vulnerability Status | updated |
2022-12-19 04:28:00 | References | updated | ||
2022-12-19 18:15:56 | Modified | Undergoing Analysis | Vulnerability Status | updated |
2023-02-23 02:14:44 | 2023-02-23T01:45:16 | CVE Modified Date | updated | |
2023-02-23 02:14:44 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-02-23 02:14:44 | Weakness Enumeration | update | ||
2023-03-27 16:15:29 | 2023-03-27T00:15:07 | CVE Modified Date | updated | |
2023-03-27 16:15:29 | Analyzed | Modified | Vulnerability Status | updated |
2023-03-27 16:15:29 | References | updated |