{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-6186","assignerOrgId":"4fe7d05b-1353-44cc-8b7a-1e416936dff2","state":"PUBLISHED","assignerShortName":"Document Fdn.","dateReserved":"2023-11-17T09:15:24.395Z","datePublished":"2023-12-11T11:56:40.349Z","dateUpdated":"2025-02-13T17:26:08.751Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"LibreOffice","vendor":"The Document Foundation","versions":[{"lessThan":"7.5.9","status":"affected","version":"7.5","versionType":"7.5 series"},{"lessThan":"7.6.4","status":"affected","version":"7.6","versionType":"7.6 series"}]}],"credits":[{"lang":"en","type":"reporter","user":"00000000-0000-4000-9000-000000000000","value":"Thanks to Reginaldo Silva of ubercomp.com for finding and reporting this issue"}],"datePublic":"2023-12-11T00:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<div>Insufficient macro permission validation of The Document Foundation LibreOffice allows an attacker to execute built-in macros without warning.</div><div>In affected versions LibreOffice supports hyperlinks with macro or similar built-in command targets that can be executed when activated without warning the user.<br></div>"}],"value":"Insufficient macro permission validation of The Document Foundation LibreOffice allows an attacker to execute built-in macros without warning.\n\nIn affected versions LibreOffice supports hyperlinks with macro or similar built-in command targets that can be executed when activated without warning the user."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"HIGH","baseScore":8.3,"baseSeverity":"HIGH","confidentialityImpact":"LOW","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"providerMetadata":{"orgId":"4fe7d05b-1353-44cc-8b7a-1e416936dff2","shortName":"Document Fdn.","dateUpdated":"2023-12-31T14:06:33.556Z"},"references":[{"tags":["vendor-advisory"],"url":"https://www.libreoffice.org/about-us/security/advisories/cve-2023-6186"},{"url":"https://www.debian.org/security/2023/dsa-5574"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG/"},{"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html"}],"source":{"discovery":"UNKNOWN"},"title":"Link targets allow arbitrary script execution","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:21:17.742Z"},"title":"CVE Program Container","references":[{"tags":["vendor-advisory","x_transferred"],"url":"https://www.libreoffice.org/about-us/security/advisories/cve-2023-6186"},{"url":"https://www.debian.org/security/2023/dsa-5574","tags":["x_transferred"]},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG/","tags":["x_transferred"]},{"url":"https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html","tags":["x_transferred"]}]}]}}