Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-9849 PoC — LibreOffice 信息泄露漏洞

Source
Associated Vulnerability
Title:LibreOffice 信息泄露漏洞 (CVE-2019-9849)
Description:LibreOffice是文档基金会(The Document Foundation,TDF)的一套开源的办公软件套件。该产品包含Writer(文本文档)、Calc(电子表格)和Impress(演示文稿)等应用程序。 LibreOffice 6.2.5.之前版本中存在安全漏洞。远程攻击者可利用该漏洞检索信息。
Description
CVE-2019-9849: Remote bullet graphics retrieved in “stealth mode” in LibreOffice
Readme
# CVE-2019-9849: Remote bullet graphics retrieved in “stealth mode” in LibreOffice

LibreOffice has a 'stealth mode' in which only documents from locations deemed 'trusted' are allowed to retrieve remote resources.
<br/>
This mode is not the default mode, but can be enabled by users who want to disable LibreOffice's ability to include remote resources within a document.
<br/>
A flaw existed where bullet graphics were omitted from this protection prior to version 6.2.5.
<br/>

<table>
	<tr>
		<th>HTML Tag</th>
		<th>HTML Attribute</th>
		<th>Triggers When Opened</th>
		<th>Triggers On Save/Export</th>
	</tr>
	<tr>
		<td><strong>ol</strong></td>
		<td><strong>src</strong></td>
		<td>No</td>
		<td>Yes</td>
	</tr>	
	<tr>
		<td><strong>ul</strong></td>
		<td><strong>src</strong></td>
		<td>No</td>
		<td>Yes</td>
	</tr>	
</table>

### Vendor Disclosure:

The vendor's disclosure for this vulnerability can be found [here](https://www.libreoffice.org/about-us/security/advisories/cve-2019-9849/).

### Proof Of Concept:

More details and the exploitation process (plus other HTML tag-attribute combination that result in SSRF) can be found in this [PDF](https://github.com/mbadanoiu/CVE-2019-9849/blob/main/LibreOffice%20-%20CVE-2019-9849.pdf).
File Snapshot

[4.0K] /data/pocs/f22ca451236fb2ac7fbbb2d7f6039c27668cf4d5 ├── [4.1M] LibreOffice - CVE-2019-9849.pdf └── [1.2K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.