CVE-2019-9848

9.8 CRITICAL

📋 TL;DR

This vulnerability in LibreOffice allows malicious documents to execute arbitrary Python commands silently without user warning. Attackers can embed scripts that trigger when documents are opened or interacted with, leading to remote code execution. It affects LibreOffice versions prior to 6.2.5.

💻 Affected Systems

Products:
  • LibreOffice
Versions: Versions prior to 6.2.5
Operating Systems: All operating systems where LibreOffice is installed
Default Config Vulnerable: ⚠️ Yes
Notes: LibreLogo feature is typically bundled and enabled by default; no special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via remote code execution, allowing attackers to install malware, steal data, or pivot to other systems.

🟠

Likely Case

Malicious document execution leading to data theft, ransomware deployment, or credential harvesting from the victim's system.

🟢

If Mitigated

Limited impact if documents are from trusted sources only and macro execution is disabled, though the vulnerability bypasses typical macro warnings.

🌐 Internet-Facing: MEDIUM - Requires user interaction (opening a document), but malicious documents can be distributed via email or downloads.
🏢 Internal Only: HIGH - Internal users frequently share documents; a single compromised document could spread malware across the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user to open a malicious document; proof-of-concept details are publicly available in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.2.5 or later

Vendor Advisory: https://www.libreoffice.org/about-us/security/advisories/cve-2019-9848/

Restart Required: No

Instructions:

1. Update LibreOffice to version 6.2.5 or newer via your package manager or official download. 2. For Linux: Use 'sudo apt update && sudo apt upgrade libreoffice' (Debian/Ubuntu) or equivalent. 3. For Windows/macOS: Download and install the latest version from libreoffice.org.

🔧 Temporary Workarounds

Disable LibreLogo

all

Remove or disable the LibreLogo feature to prevent script execution.

On Linux: sudo apt remove libreoffice-script-provider-python
On Windows: Uninstall LibreLogo via Add/Remove Programs or disable in Tools > Options > LibreOffice > Advanced

Restrict Document Sources

all

Only open documents from trusted sources and disable automatic script execution.

In LibreOffice: Tools > Options > Security > Macro Security > Set to 'Very High'

🧯 If You Can't Patch

  • Use alternative office software that is not vulnerable, such as updated versions of other suites.
  • Implement application whitelisting to block LibreOffice execution entirely in high-risk environments.

🔍 How to Verify

Check if Vulnerable:

Check LibreOffice version: In the application, go to Help > About LibreOffice. If version is below 6.2.5, it is vulnerable.

Check Version:

libreoffice --version (Linux/macOS) or check via Help menu in GUI.

Verify Fix Applied:

After updating, confirm version is 6.2.5 or higher via Help > About LibreOffice. Test with a safe document that previously triggered LibreLogo events.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process spawns from LibreOffice (e.g., python.exe, cmd.exe)
  • Log entries showing document events triggering scripts in LibreOffice logs

Network Indicators:

  • Outbound connections from LibreOffice process to unknown IPs, potentially indicating command-and-control activity

SIEM Query:

Process creation where parent process contains 'libreoffice' and child process is 'python' or 'cmd'

🔗 References

📤 Share & Export