{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-12426","assignerOrgId":"4fe7d05b-1353-44cc-8b7a-1e416936dff2","state":"PUBLISHED","assignerShortName":"Document Fdn.","dateReserved":"2024-12-10T16:37:23.376Z","datePublished":"2025-01-07T12:22:32.991Z","dateUpdated":"2025-11-03T20:36:39.840Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"LibreOffice","vendor":"The Document Foundation","versions":[{"lessThan":"< 24.8.4","status":"affected","version":"24.8","versionType":"24.8 series"}]}],"credits":[{"lang":"en","type":"reporter","value":"Thomas Rinsma of Codean Labs"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<div>Exposure of Environmental Variables and arbitrary INI file values to an Unauthorized Actor vulnerability in The Document Foundation LibreOffice.</div><div><br></div><div>URLs could be constructed which expanded environmental variables or INI file values, so potentially sensitive information could be exfiltrated to a remote server on opening a document containing such links.<br></div><p>This issue affects LibreOffice: from 24.8 before &lt; 24.8.4.</p>"}],"value":"Exposure of Environmental Variables and arbitrary INI file values to an Unauthorized Actor vulnerability in The Document Foundation LibreOffice.\n\n\n\n\nURLs could be constructed which expanded environmental variables or INI file values, so potentially sensitive information could be exfiltrated to a remote server on opening a document containing such links.\n\n\nThis issue affects LibreOffice: from 24.8 before < 24.8.4."}],"impacts":[{"capecId":"CAPEC-13","descriptions":[{"lang":"en","value":"CAPEC-13 Subverting Environment Variable Values"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"LOCAL","baseScore":6.7,"baseSeverity":"MEDIUM","privilegesRequired":"LOW","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"HIGH","subIntegrityImpact":"NONE","userInteraction":"PASSIVE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-200","description":"CWE-200 Exposure of Sensitive Information to an Unauthorized Actor","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"4fe7d05b-1353-44cc-8b7a-1e416936dff2","shortName":"Document Fdn.","dateUpdated":"2025-01-07T12:22:32.991Z"},"references":[{"url":"https://www.libreoffice.org/about-us/security/advisories/cve-2024-12426"}],"source":{"discovery":"EXTERNAL"},"title":"URL fetching can be used to exfiltrate arbitrary INI file values and environment variables","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-07T14:38:29.579414Z","id":"CVE-2024-12426","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-07T14:38:34.076Z"}},{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/01/msg00013.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T20:36:39.840Z"}}]}}