Tuesday, November 26, 2024
HomeCVE/vulnerabilityUnpatched RCE Vulnerability in LibreOffice Let Hackers Take Complete Control Of Your...

Unpatched RCE Vulnerability in LibreOffice Let Hackers Take Complete Control Of Your Computer

Published on

The researcher discovered a code execution vulnerability in LibreOffice let an attacker hack your computer by just sending a weaponized document with macro and promote a user to Open it via LibreOffice.

LibreOffice is an open-source office suite alternative of MS office developed by The Document Foundation that compatible with .doc, .docx, .xls, .xlsx, .ppt, .pptx files and supports all the operating system platform.

Very recently LibreOffice patched an arbitrary script execution vulnerability ( CVE-2019-9848) that allows attackers to execute arbitrary python commands silently without warning to exploit the vulnerable system.

- Advertisement - SIEM as a Service

A researcher with the name Alex in Twitter claims that he successfully bypassed the fix of CVE-2019-9848 in LibreOffice 6.2.5.

Earlier this year, Alex also found the similar RCE vulnerability in LibreOffice that allows attackers to exploit the arbitrary code in Windows and Linux Platform.

Nils Emmerich from Insinuator found this vulnerability (CVE-2019-9848) and his research explains that a macro shipped with LibreOffice are executed without prompting the user.

The bug allows an attacker to execute the code on a vulnerable machine and exploit the system without prompting users to enable the macro.

By Default, LibreOffice shipped with LibreLogo (Python Interpreter), a macro to programmable move a turtle vector graphic to executes custom script code that is internally translated to python code and executed.

According to Emmerich, The critical bug exactly resides in the LibreLogo, in which the code is not translated well and just supplying python code as the script code often results in the same code after translation.

A proof of concept where he explained the method to exploit the bug by placing the content, in which Run is a hyperlink executing LibreLogo:run on a mouseover event.

In this PoC explains that the code simply executed without prompt to the user asking to run the code and it is even possible to get code execution  Using forms and the OnFocus event without mouseover event.

Since Alex reported his new bug, LibreOffice Team still working to fix the vulnerability, until then users recommend disabling the LibreLogo component in the current version of LibreOffice.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Blue Yonder Ransomware Attack Impacts Starbucks & Multiple Supermarkets

A ransomware attack on Blue Yonder, a leading supply chain management software provider, has...

Dell Wyse Management Suite Vulnerabilities Let Attackers Exploit Affected Systems Remotely

Dell Technologies has released a security update for its Wyse Management Suite (WMS) to...

CISA Details Red Team Assessment Including TTPs & Network Defense

The Cybersecurity and Infrastructure Security Agency (CISA) recently detailed findings from a Red Team...

IBM Workload Scheduler Vulnerability Stores User Credentials in Plain Text

IBM has issued a security bulletin warning customers about a vulnerability in its Workload...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Multiple Flaws With Android & Google Pixel Devices Let Attackers Elevate Privileges

Several high-severity vulnerabilities have been identified in Android and Google Pixel devices, exposing millions...

7-Zip RCE Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip,...

Helldown Ransomware Attacking VMware ESXi And Linux Servers

Helldown, a new ransomware group, actively exploits vulnerabilities to breach networks, as since August...