{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-6185","assignerOrgId":"4fe7d05b-1353-44cc-8b7a-1e416936dff2","state":"PUBLISHED","assignerShortName":"Document Fdn.","dateReserved":"2023-11-17T09:15:06.687Z","datePublished":"2023-12-11T11:52:06.388Z","dateUpdated":"2025-02-13T17:26:08.159Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"LibreOffice","vendor":"The Document Foundation","versions":[{"lessThan":"7.5.9","status":"affected","version":"7.5","versionType":"7.5 series"},{"lessThan":"7.6.3","status":"affected","version":"7.6","versionType":"7.6 series"}]}],"credits":[{"lang":"en","type":"reporter","user":"00000000-0000-4000-9000-000000000000","value":"Thanks to Reginaldo Silva of ubercomp.com for finding and reporting this issue"}],"datePublic":"2023-12-11T00:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<div>Improper Input Validation vulnerability in GStreamer integration of The Document Foundation LibreOffice allows an attacker to execute arbitrary GStreamer plugins.</div><div>In affected versions the filename of the embedded video is not sufficiently escaped when passed to GStreamer enabling an attacker to run arbitrary gstreamer plugins depending on what plugins are installed on the target system.</div>"}],"value":"Improper Input Validation vulnerability in GStreamer integration of The Document Foundation LibreOffice allows an attacker to execute arbitrary GStreamer plugins.\n\nIn affected versions the filename of the embedded video is not sufficiently escaped when passed to GStreamer enabling an attacker to run arbitrary gstreamer plugins depending on what plugins are installed on the target system."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"HIGH","baseScore":8.3,"baseSeverity":"HIGH","confidentialityImpact":"LOW","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"providerMetadata":{"orgId":"4fe7d05b-1353-44cc-8b7a-1e416936dff2","shortName":"Document Fdn.","dateUpdated":"2023-12-31T14:06:29.950Z"},"references":[{"tags":["vendor-advisory"],"url":"https://www.libreoffice.org/about-us/security/advisories/cve-2023-6185"},{"url":"https://www.debian.org/security/2023/dsa-5574"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG/"},{"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html"}],"source":{"discovery":"UNKNOWN"},"title":"Improper input validation enabling arbitrary Gstreamer pipeline injection","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:21:17.741Z"},"title":"CVE Program Container","references":[{"tags":["vendor-advisory","x_transferred"],"url":"https://www.libreoffice.org/about-us/security/advisories/cve-2023-6185"},{"url":"https://www.debian.org/security/2023/dsa-5574","tags":["x_transferred"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG/","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2023-12-20T16:47:31.483769Z","id":"CVE-2023-6185","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-12-02T16:58:58.281Z"}}]}}