A vulnerability was found in LibreOffice prior to 6.2.6. LibreOffice has a feature where documents can specify that pre-installed macros can be executed on various script events such as mouse-over, document-open etc. Access is intended to be restricted to scripts under the share/Scripts/python, user/Scripts/python sub-directories of the LibreOffice install. Protection was added, to address CVE-2018-16858, to avoid a directory traversal attack where scripts in arbitrary locations on the file system could be executed. However this new protection could be bypassed by a URL encoding attack. In the fixed versions, the parsed url describing the script location is correctly encoded before further processing. Reference: https://seclists.org/bugtraq/2019/Aug/28
Created libreoffice tracking bugs for this issue: Affects: fedora-all [bug 1744869]
External References: https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9852
Patch: https://cgit.freedesktop.org/libreoffice/core/commit/?id=315c51731384230194af26b86a976bf5d06c9dcc
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:1151 https://access.redhat.com/errata/RHSA-2020:1151
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-9852
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:1598 https://access.redhat.com/errata/RHSA-2020:1598