CVE-2020-12803

ODF documents can contain forms to be filled out by the user. Similar to HTML forms, the contained form data can be submitted to a URI, for example, to an external web server. To create submittable forms, ODF implements the XForms W3C standard, which allows data to be submitted without the need for macros or other active scripting Prior to version 6.4.4 LibreOffice allowed forms to be submitted to any URI, including file: URIs, enabling form submissions to overwrite local files. User-interaction is required to submit the form, but to avoid the possibility of malicious documents engineered to maximize the possibility of inadvertent user submission this feature has now been limited to http[s] URIs, removing the possibility to overwrite local files. This issue affects: The Document Foundation LibreOffice versions prior to 6.4.4.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.5 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Document Fdn.CNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 63%
VendorProductVersion
libreofficelibreoffice
𝑥
< 6.4.4
opensuseleap
15.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libreoffice
bullseye
1:7.0.4-4+deb11u10
fixed
stretch
ignored
jessie
ignored
bullseye (security)
1:7.0.4-4+deb11u11
fixed
bookworm
4:7.4.7-1+deb12u4
fixed
bookworm (security)
4:7.4.7-1+deb12u5
fixed
sid
4:24.8.2-2
fixed
trixie
4:24.8.2-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libreoffice
lunar
Fixed 1:6.4.4-0ubuntu1
released
kinetic
Fixed 1:6.4.4-0ubuntu1
released
jammy
Fixed 1:6.4.4-0ubuntu1
released
impish
Fixed 1:6.4.4-0ubuntu1
released
hirsute
Fixed 1:6.4.4-0ubuntu1
released
groovy
Fixed 1:6.4.4-0ubuntu1
released
focal
Fixed 1:6.4.7-0ubuntu0.20.04.1
released
eoan
ignored
bionic
Fixed 1:6.0.7-0ubuntu0.18.04.12
released
xenial
ignored
trusty
dne