Skip to content

Commit

Permalink
Merge pull request #41 from telekom-security/co_js_inject
Browse files Browse the repository at this point in the history
add collabora office post
  • Loading branch information
tehofu authored Sep 6, 2024
2 parents 9bed773 + 4ee23c4 commit 4330dce
Showing 1 changed file with 45 additions and 0 deletions.
45 changes: 45 additions & 0 deletions _posts/2024-09-06-collabora-office-android-javascript-injection.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,45 @@
---
title: Collabora Office for Android - JavaScript Injection via Links
header: Collabora Office for Android - JavaScript Injection via Links
tags: ['advisories']
cwes: ['Improper Neutralization of Encoded URI Schemes in a Web Page (CWE-84)']
affected_product: 'Collabora Office for Android'
vulnerability_release_date: '2024-08-29'
---

A JavaScript Injection vulnerability (CVE-2024-45045) has been identified in Collabora Office for Android, allowing an attacker to execute arbitrary JavaScript within the context of the Android App when a victim opens a specially crafted document.<!--more-->

### Details

* **Product:** Collabora Office for Android
* **Affected Version:** < 24.04.6.2
* **Vulnerability Type:** Improper Neutralization of Encoded URI Schemes in a Web Page (CWE-84)
* **Risk Level:** Medium
* **Vendor URL:** https://www.collaboraonline.com/collabora-office-android-ios/
* **Vendor acknowledged vulnerability:** Yes
* **Vendor Status:** Fixed
* **CVE:** CVE-2024-45045

The vulnerability was discovered during testing of Collabora Office for Android. In affected versions of the app, it is possible to inject JavaScript via a document with a specially crafted link using URL-encoded values. For instance, a link with the target `"http://www.google.de/%22%27%2b%61%6c%65%72%74%28%31%29%2b%27"` triggers the execution of the JavaScript code `"alert(1)"` when the link is activated. Since it is possible for a link to be automatically activated when a document is opened, the vulnerability could be triggered after a victim opens a document without any further user interaction.

### Impact

Since the Android JavaScript interface allows access to internal functions, the likelihood that the app could be compromised via this vulnerability is considered high.

### Remediation

It is recommended to upgrade to the latest version of Collabora Office for Android to fix this vulnerability.

### References
- [Collabora Advisory](https://github.com/CollaboraOnline/online/security/advisories/GHSA-78cg-rg4q-26qv)
- [Collabora Office - Play Store](https://play.google.com/store/apps/details?id=com.collabora.libreoffice)

### Timeline

* **2024-03-18:** Vulnerability reported to the vendor.
* **2024-08-29:** Vendor has reported that the vulnerability has been fixed.
* **2024-09-06:** This blog post was published.

### Credits

* Holger Fuhrmannek (<[email protected]>)

0 comments on commit 4330dce

Please sign in to comment.