Documents operations, in this case "drawing", could be manipulated to contain invalid data types, possibly script code. Script code could be injected to an operation that would be executed for users that are actively collaborating on the same document. Operation data exchanged between collaborating parties does now gets checked for validity to avoid code execution. No publicly available exploits are known.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-32649 | Documents operations, in this case "drawing", could be manipulated to contain invalid data types, possibly script code. Script code could be injected to an operation that would be executed for users that are actively collaborating on the same document. Operation data exchanged between collaborating parties does now gets checked for validity to avoid code execution. No publicly available exploits are known. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: OX
Published:
Updated: 2024-08-02T14:00:14.652Z
Reserved: 2023-03-30T09:34:25.188Z
Link: CVE-2023-29045
No data.
Status : Modified
Published: 2023-11-02T14:15:11.153
Modified: 2024-11-21T07:56:26.413
Link: CVE-2023-29045
No data.
OpenCVE Enrichment
No data.
EUVD