{"containers":{"cna":{"affected":[{"product":"LibreOffice","vendor":"Document Foundation","versions":[{"lessThan":"6.2.7","status":"affected","version":"6.2","versionType":"custom"},{"lessThan":"6.3.1","status":"affected","version":"6.3","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Thanks to alex (@insertscript) for reporting this issue"}],"datePublic":"2019-09-06T00:00:00.000Z","descriptions":[{"lang":"en","value":"LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. LibreOffice also has a feature where documents can specify that pre-installed scripts can be executed on various document script events such as mouse-over, etc. Protection was added to block calling LibreLogo from script event handers. However a Windows 8.3 path equivalence handling flaw left LibreOffice vulnerable under Windows that a document could trigger executing LibreLogo via a Windows filename pseudonym. This issue affects: Document Foundation LibreOffice 6.2 versions prior to 6.2.7; 6.3 versions prior to 6.3.1."}],"problemTypes":[{"descriptions":[{"description":"Windows 8.3 path equivalence handling flaw","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2019-10-22T05:03:53.000Z","orgId":"4fe7d05b-1353-44cc-8b7a-1e416936dff2","shortName":"Document Fdn."},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9855/"},{"name":"openSUSE-SU-2019:2183","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html"},{"name":"openSUSE-SU-2019:2361","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00055.html"}],"source":{"discovery":"UNKNOWN"},"title":"Windows 8.3 path equivalence handling flaw allows LibreLogo script execution","x_generator":{"engine":"Vulnogram 0.0.7"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security@documentfoundation.org","DATE_PUBLIC":"2019-09-06T00:00:00.000Z","ID":"CVE-2019-9855","STATE":"PUBLIC","TITLE":"Windows 8.3 path equivalence handling flaw allows LibreLogo script execution"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"LibreOffice","version":{"version_data":[{"version_affected":"<","version_name":"6.2","version_value":"6.2.7"},{"version_affected":"<","version_name":"6.3","version_value":"6.3.1"}]}}]},"vendor_name":"Document Foundation"}]}},"credit":[{"lang":"eng","value":"Thanks to alex (@insertscript) for reporting this issue"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. LibreOffice also has a feature where documents can specify that pre-installed scripts can be executed on various document script events such as mouse-over, etc. Protection was added to block calling LibreLogo from script event handers. However a Windows 8.3 path equivalence handling flaw left LibreOffice vulnerable under Windows that a document could trigger executing LibreLogo via a Windows filename pseudonym. This issue affects: Document Foundation LibreOffice 6.2 versions prior to 6.2.7; 6.3 versions prior to 6.3.1."}]},"generator":{"engine":"Vulnogram 0.0.7"},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Windows 8.3 path equivalence handling flaw"}]}]},"references":{"reference_data":[{"name":"https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9855/","refsource":"CONFIRM","url":"https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9855/"},{"name":"openSUSE-SU-2019:2183","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html"},{"name":"openSUSE-SU-2019:2361","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00055.html"}]},"source":{"discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T22:01:55.101Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9855/"},{"name":"openSUSE-SU-2019:2183","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00067.html"},{"name":"openSUSE-SU-2019:2361","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00055.html"}]}]},"cveMetadata":{"assignerOrgId":"4fe7d05b-1353-44cc-8b7a-1e416936dff2","assignerShortName":"Document Fdn.","cveId":"CVE-2019-9855","datePublished":"2019-09-06T18:40:17.271Z","dateReserved":"2019-03-17T00:00:00.000Z","dateUpdated":"2024-09-16T18:49:33.756Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}