First published: Thu Dec 28 2023(Updated: )
Apache OpenOffice documents can contain links that call internal macros with arbitrary arguments. Several URI Schemes are defined for this purpose. Links can be activated by clicks, or by automatic document events. The execution of such links must be subject to user approval. In the affected versions of OpenOffice, approval for certain links is not requested; when activated, such links could therefore result in arbitrary script execution. This is a corner case of CVE-2022-47502.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
<4.1.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-47804 is considered a high-severity vulnerability due to its potential for executing arbitrary commands via internal macro links in Apache OpenOffice documents.
To mitigate CVE-2023-47804, users should update Apache OpenOffice to version 4.1.15 or later, ensuring that document links are subject to user approval.
CVE-2023-47804 affects all versions of Apache OpenOffice prior to 4.1.15.
The impact of CVE-2023-47804 includes the risk of unauthorized execution of macros which could lead to execution of arbitrary code on the user's machine.
Under CVE-2023-47804, macro links are not safe unless user confirmation is required before execution.