8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.002 Low
EPSS
Percentile
53.5%
According to its self-reported version, the LibreOffice application running on the remote host is prior to 7.2.7 or 7.3.3. It is, therefore, affected by multiple vulnerabilities:
LibreOffice supports the storage of passwords for web connections in the user’s configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in LibreOffice existed where the required initialization vector for encryption was always the same which weakens the security of the encryption making them vulnerable if an attacker has access to the user’s configuration data. (CVE-2022-26306)
LibreOffice supports the storage of passwords for web connections in the user’s configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in LibreOffice existed where the master key was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords vulerable to a brute force attack if an attacker has access to the users stored config. (CVE-2022-26307)
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(163763);
script_version("1.5");
script_set_attribute(attribute:"plugin_modification_date", value:"2022/10/18");
script_cve_id("CVE-2022-26306", "CVE-2022-26307");
script_xref(name:"IAVB", value:"2022-B-0024-S");
script_name(english:"LibreOffice < 7.2.7 / 7.3 < 7.3.3 Multiple Vulnerabilities (macOS)");
script_set_attribute(attribute:"synopsis", value:
"Multiple vulnerabilities exist in Document Foundation LibreOffice versions prior to 7.2.7 or 7.3.3.");
script_set_attribute(attribute:"description", value:
"According to its self-reported version, the LibreOffice application running on the remote host is prior to 7.2.7 or
7.3.3. It is, therefore, affected by multiple vulnerabilities:
- LibreOffice supports the storage of passwords for web connections in the user's configuration database. The stored
passwords are encrypted with a single master key provided by the user. A flaw in LibreOffice existed where the
required initialization vector for encryption was always the same which weakens the security of the encryption
making them vulnerable if an attacker has access to the user's configuration data. (CVE-2022-26306)
- LibreOffice supports the storage of passwords for web connections in the user's configuration database. The stored
passwords are encrypted with a single master key provided by the user. A flaw in LibreOffice existed where the master
key was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords vulerable
to a brute force attack if an attacker has access to the users stored config. (CVE-2022-26307)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
# https://www.libreoffice.org/about-us/security/advisories/CVE-2022-26306
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?f904b9b7");
# https://www.libreoffice.org/about-us/security/advisories/CVE-2022-26307
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?3bce5d24");
script_set_attribute(attribute:"solution", value:
"Upgrade to LibreOffice version 7.2.7, 7.3.3 or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2022-26307");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"vuln_publication_date", value:"2022/07/25");
script_set_attribute(attribute:"patch_publication_date", value:"2022/07/25");
script_set_attribute(attribute:"plugin_publication_date", value:"2022/08/03");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:libreoffice:libreoffice");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"MacOS X Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("libreoffice_installed.nasl");
script_require_keys("installed_sw/LibreOffice", "Host/MacOSX/Version");
exit(0);
}
include('vcf.inc');
get_kb_item_or_exit('Host/MacOSX/Version');
var app_info = vcf::get_app_info(app:'LibreOffice');
var constraints = [
{'min_version':'1.0', 'fixed_version':'7.2.7'},
{'min_version':'7.3', 'fixed_version':'7.3.3'}
];
vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);
Vendor | Product | Version | CPE |
---|---|---|---|
libreoffice | libreoffice | cpe:/a:libreoffice:libreoffice |