Created attachment 190471 [details]
"LibreOffice Calc supports a WEBSERVICE function to obtain data by URL. Vulnerable versions of LibreOffice allow WEBSERVICE to take a local file URL (e.g file://) which can be used to inject local files into the spreadsheet without warning the user. Subsequent formulas can operate on that inserted data and construct a remote URL whose path leaks the local data to a remote attacker."
"In later versions of LibreOffice without this flaw, WEBSERVICE has now been limited to accessing http and https URLs along with bringing WEBSERVICE URLs under LibreOffice Calc's link management infrastructure."
This vulnerability has been identified upstream as CVE-2018-1055,
but NVD/Mitre are advising it's a reservation duplicate of
CVE-2018-6871 which should be used instead.
A commit references this bug:
Date: Fri Feb 23 22:00:39 UTC 2018
New revision: 462748
security/vuxml: Document vulnerability in editors/libreoffice
Submitted by: Vladimir Krstulja <email@example.com>
Committed, I removed all language packs because they depend of libreoffice.
(In reply to Danilo G. Baio from comment #2)
Thanks. Are you sure that's correct? I did not list language packs (editors/libreoffice-<lang>), that are separate packages that DO pull in libreoffice; but individual language based slave ports. Those do not pull in libreoffice, those ARE libreoffice, in specific langs with PGNAMEPREFIX.
(In reply to Vladimir Krstulja from comment #3)
Yes, <language>/libreoffice ports are also language packs.