CVE-2020-12803

EUVD-2020-5086
ODF documents can contain forms to be filled out by the user. Similar to HTML forms, the contained form data can be submitted to a URI, for example, to an external web server. To create submittable forms, ODF implements the XForms W3C standard, which allows data to be submitted without the need for macros or other active scripting Prior to version 6.4.4 LibreOffice allowed forms to be submitted to any URI, including file: URIs, enabling form submissions to overwrite local files. User-interaction is required to submit the form, but to avoid the possibility of malicious documents engineered to maximize the possibility of inadvertent user submission this feature has now been limited to http[s] URIs, removing the possibility to overwrite local files. This issue affects: The Document Foundation LibreOffice versions prior to 6.4.4.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.5 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 67%
Affected Products (NVD)
VendorProductVersion
libreofficelibreoffice
𝑥
< 6.4.4
opensuseleap
15.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libreoffice
bookworm
4:7.4.7-1+deb12u4
fixed
bookworm (security)
4:7.4.7-1+deb12u5
fixed
bullseye
1:7.0.4-4+deb11u10
fixed
bullseye (security)
1:7.0.4-4+deb11u11
fixed
jessie
ignored
sid
4:24.8.2-2
fixed
stretch
ignored
trixie
4:24.8.2-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libreoffice
bionic
Fixed 1:6.0.7-0ubuntu0.18.04.12
released
eoan
ignored
focal
Fixed 1:6.4.7-0ubuntu0.20.04.1
released
groovy
Fixed 1:6.4.4-0ubuntu1
released
hirsute
Fixed 1:6.4.4-0ubuntu1
released
impish
Fixed 1:6.4.4-0ubuntu1
released
jammy
Fixed 1:6.4.4-0ubuntu1
released
kinetic
Fixed 1:6.4.4-0ubuntu1
released
lunar
Fixed 1:6.4.4-0ubuntu1
released
trusty
dne
xenial
ignored