diff options
author | dbaio <dbaio@FreeBSD.org> | 2018-02-24 06:00:38 +0800 |
---|---|---|
committer | dbaio <dbaio@FreeBSD.org> | 2018-02-24 06:00:38 +0800 |
commit | b788525c4336c45ccff893c60d20ba1972602786 (patch) | |
tree | c92089d19cb77ff2d929c11557ff0dd9a144f78f /security | |
parent | c2d944ee2273b035566c71340aca686a34242cbc (diff) | |
download | freebsd-ports-gnome-b788525c4336c45ccff893c60d20ba1972602786.tar.gz freebsd-ports-gnome-b788525c4336c45ccff893c60d20ba1972602786.tar.zst freebsd-ports-gnome-b788525c4336c45ccff893c60d20ba1972602786.zip |
security/vuxml: Document vulnerability in editors/libreoffice
Security: CVE-2018-6871
PR: 225797
Submitted by: Vladimir Krstulja <vlad-fbsd@acheronmedia.com>
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 40 |
1 files changed, 40 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 45ce1117b5cf..3a6479d92636 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,46 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="289269f1-0def-11e8-99b0-d017c2987f9a"> + <topic>LibreOffice -- Remote arbitrary file disclosure vulnerability via WEBSERVICE formula</topic> + <affects> + <package> + <name>libreoffice</name> + <range><lt>5.4.5</lt></range> + <range><ge>6.0.0</ge><lt>6.0.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>LibreOffice reports:</p> + <blockquote cite="https://www.libreoffice.org/about-us/security/advisories/cve-2018-1055/"> + <p>LibreOffice Calc supports a WEBSERVICE function to obtain data by URL. + Vulnerable versions of LibreOffice allow WEBSERVICE to take a local file + URL (e.g file://) which can be used to inject local files into the + spreadsheet without warning the user. Subsequent formulas can operate on + that inserted data and construct a remote URL whose path leaks the local + data to a remote attacker.</p> + <p>In later versions of LibreOffice without this flaw, WEBSERVICE has now + been limited to accessing http and https URLs along with bringing + WEBSERVICE URLs under LibreOffice Calc's link management infrastructure.</p> + <p><strong>Note:</strong> This vulnerability has been identified upstream + as CVE-2018-1055, but NVD/Mitre are advising it's a reservation + duplicate of CVE-2018-6871 which should be used instead.</p> + </blockquote> + </body> + </description> + <references> + <url>https://www.libreoffice.org/about-us/security/advisories/cve-2018-1055/</url> + <url>https://github.com/jollheef/libreoffice-remote-arbitrary-file-disclosure</url> + <cvename>CVE-2018-6871</cvename> + <freebsdpr>ports/225797</freebsdpr> + </references> + <dates> + <discovery>2018-02-09</discovery> + <entry>2018-02-23</entry> + </dates> + </vuln> + <vuln vid="d5b6d151-1887-11e8-94f7-9c5c8e75236a"> <topic>squid -- Vulnerable to Denial of Service attack</topic> <affects> |