{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-3140","assignerOrgId":"4fe7d05b-1353-44cc-8b7a-1e416936dff2","assignerShortName":"Document Fdn.","dateUpdated":"2024-08-03T01:00:10.521Z","dateReserved":"2022-09-06T00:00:00.000Z","datePublished":"2022-10-11T00:00:00.000Z"},"containers":{"cna":{"title":"Macro URL arbitrary script execution","providerMetadata":{"orgId":"4fe7d05b-1353-44cc-8b7a-1e416936dff2","shortName":"Document Fdn.","dateUpdated":"2023-03-26T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"LibreOffice supports Office URI Schemes to enable browser integration of LibreOffice with MS SharePoint server. An additional scheme 'vnd.libreoffice.command' specific to LibreOffice was added. In the affected versions of LibreOffice links using that scheme could be constructed to call internal macros with arbitrary arguments. Which when clicked on, or activated by document events, could result in arbitrary script execution without warning. This issue affects: The Document Foundation LibreOffice 7.4 versions prior to 7.4.1; 7.3 versions prior to 7.3.6."}],"affected":[{"vendor":"The Document Foundation","product":"LibreOffice","versions":[{"version":"7.4","status":"affected","lessThan":"7.4.1","versionType":"custom"},{"version":"7.3","status":"affected","lessThan":"7.3.6","versionType":"custom"}]}],"references":[{"url":"https://www.libreoffice.org/about-us/security/advisories/CVE-2022-3140"},{"name":"DSA-5252","tags":["vendor-advisory"],"url":"https://www.debian.org/security/2022/dsa-5252"},{"name":"FEDORA-2022-775c747e4a","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TORANVTIWWBH3DNJR4UZATAG67KZOH32/"},{"name":"GLSA-202212-04","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202212-04"},{"name":"[debian-lts-announce] 20230326 [SECURITY] [DLA 3368-1] libreoffice security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00022.html"}],"credits":[{"lang":"en","value":"TheSecurityDev working with Trend Micro Zero Day Initiative"}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-20 Improper Input Validation","cweId":"CWE-20"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"discovery":"EXTERNAL"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T01:00:10.521Z"},"title":"CVE Program Container","references":[{"url":"https://www.libreoffice.org/about-us/security/advisories/CVE-2022-3140","tags":["x_transferred"]},{"name":"DSA-5252","tags":["vendor-advisory","x_transferred"],"url":"https://www.debian.org/security/2022/dsa-5252"},{"name":"FEDORA-2022-775c747e4a","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TORANVTIWWBH3DNJR4UZATAG67KZOH32/"},{"name":"GLSA-202212-04","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202212-04"},{"name":"[debian-lts-announce] 20230326 [SECURITY] [DLA 3368-1] libreoffice security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2023/03/msg00022.html"}]}]}}