cve/2022/CVE-2022-26306.md

18 lines
1.0 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-26306](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26306)
![](https://img.shields.io/static/v1?label=Product&message=LibreOffice&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=7.2%3C%207.2.7%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-326%20Inadequate%20Encryption%20Strength&color=brighgreen)
### Description
LibreOffice supports the storage of passwords for web connections in the users configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in LibreOffice existed where the required initialization vector for encryption was always the same which weakens the security of the encryption making them vulnerable if an attacker has access to the user's configuration data. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.7; 7.3 versions prior to 7.3.1.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon