CVE-2024-25114 (GCVE-0-2024-25114)
Vulnerability from cvelistv5
Published
2024-03-11 21:32
Modified
2025-04-16 15:43
CWE
  • CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
Collabora Online is a collaborative online office suite based on LibreOffice technology. Each document in Collabora Online is opened by a separate "Kit" instance in a different "jail" with a unique directory "jailID" name. For security reasons, this directory name is randomly generated and should not be given out to the client. In affected versions of Collabora Online it is possible to use the CELL() function, with the "filename" argument, in the spreadsheet component to get a path which includes this JailID. The impact of this vulnerability in its own is low because it requires to be chained with another vulnerability. Users should upgrade to Collabora Online 23.05.9; Collabora Online 22.05.22; Collabora Online 21.11.10 or higher. There are no known workarounds for this vulnerability.
Impacted products
Vendor Product Version
CollaboraOnline online Version: >= 23.0.0, < 23.05.9
Version: >= 22.0.0, < 22.05.22
Version: < 21.11.9.4
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-25114",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-12T17:23:49.855657Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-16T15:43:32.209Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T23:36:21.604Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://github.com/CollaboraOnline/online/security/advisories/GHSA-2fh2-ppjf-p3xv",
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/CollaboraOnline/online/security/advisories/GHSA-2fh2-ppjf-p3xv"
          },
          {
            "name": "https://github.com/LibreOffice/online/blob/master/wsd/README",
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/LibreOffice/online/blob/master/wsd/README"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "online",
          "vendor": "CollaboraOnline",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e= 23.0.0, \u003c 23.05.9"
            },
            {
              "status": "affected",
              "version": "\u003e= 22.0.0, \u003c 22.05.22"
            },
            {
              "status": "affected",
              "version": "\u003c 21.11.9.4"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Collabora Online is a collaborative online office suite based on LibreOffice technology. Each document in Collabora Online is opened by a separate \"Kit\" instance in a different \"jail\" with a unique directory \"jailID\" name. For security reasons, this directory name is randomly generated and should not be given out to the client. In affected versions of Collabora Online it is possible to use the CELL() function, with the \"filename\" argument, in the spreadsheet component to get a path which includes this JailID. The impact of this vulnerability in its own is low because it requires to be chained with another vulnerability. Users should upgrade to Collabora Online 23.05.9; Collabora Online 22.05.22; Collabora Online 21.11.10 or higher. There are no known workarounds for this vulnerability."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 2.6,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-03-11T21:32:12.513Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/CollaboraOnline/online/security/advisories/GHSA-2fh2-ppjf-p3xv",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/CollaboraOnline/online/security/advisories/GHSA-2fh2-ppjf-p3xv"
        },
        {
          "name": "https://github.com/LibreOffice/online/blob/master/wsd/README",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/LibreOffice/online/blob/master/wsd/README"
        }
      ],
      "source": {
        "advisory": "GHSA-2fh2-ppjf-p3xv",
        "discovery": "UNKNOWN"
      },
      "title": "Sensitive Information Disclosure (JailID) to users in Collabora Online"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2024-25114",
    "datePublished": "2024-03-11T21:32:12.513Z",
    "dateReserved": "2024-02-05T14:14:46.379Z",
    "dateUpdated": "2025-04-16T15:43:32.209Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-25114\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-03-11T22:15:54.870\",\"lastModified\":\"2025-02-27T03:01:27.767\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Collabora Online is a collaborative online office suite based on LibreOffice technology. Each document in Collabora Online is opened by a separate \\\"Kit\\\" instance in a different \\\"jail\\\" with a unique directory \\\"jailID\\\" name. For security reasons, this directory name is randomly generated and should not be given out to the client. In affected versions of Collabora Online it is possible to use the CELL() function, with the \\\"filename\\\" argument, in the spreadsheet component to get a path which includes this JailID. The impact of this vulnerability in its own is low because it requires to be chained with another vulnerability. Users should upgrade to Collabora Online 23.05.9; Collabora Online 22.05.22; Collabora Online 21.11.10 or higher. There are no known workarounds for this vulnerability.\"},{\"lang\":\"es\",\"value\":\"Collabora Online es una suite ofim\u00e1tica colaborativa en l\u00ednea basada en la tecnolog\u00eda LibreOffice. Cada documento en Collabora Online se abre mediante una instancia de \\\"Kit\\\" separada en una \\\"c\u00e1rcel\\\" diferente con un nombre de directorio \u00fanico \\\"jailID\\\". Por razones de seguridad, este nombre de directorio se genera aleatoriamente y no debe entregarse al cliente. En las versiones afectadas de Collabora Online es posible utilizar la funci\u00f3n CELL(), con el argumento \\\"nombre de archivo\\\", en el componente de hoja de c\u00e1lculo para obtener una ruta que incluya este JailID. El impacto de esta vulnerabilidad por s\u00ed sola es bajo porque requiere ser encadenada con otra vulnerabilidad. Los usuarios deben actualizar a Collabora Online 23.05.9; Colabora en l\u00ednea 22.05.22; Collabora Online 21.11.10 o superior. No se conocen workarounds para esta vulnerabilidad.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N\",\"baseScore\":2.6,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.2,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:collabora:online:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"21.11.9.4\",\"matchCriteriaId\":\"2DDB546D-1017-4700-9AA3-8ABC3C86CAFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:collabora:online:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"22.05.0\",\"versionEndExcluding\":\"22.05.22\",\"matchCriteriaId\":\"0D7EE9D3-E1CF-41C5-BB1D-2B61115B6D1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:collabora:online:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"23.05.0\",\"versionEndExcluding\":\"23.05.9\",\"matchCriteriaId\":\"39BFC2F4-6A64-439E-AFB7-EA5807ABD9EC\"}]}]}],\"references\":[{\"url\":\"https://github.com/CollaboraOnline/online/security/advisories/GHSA-2fh2-ppjf-p3xv\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/LibreOffice/online/blob/master/wsd/README\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Exploit\"]},{\"url\":\"https://github.com/CollaboraOnline/online/security/advisories/GHSA-2fh2-ppjf-p3xv\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://github.com/LibreOffice/online/blob/master/wsd/README\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/CollaboraOnline/online/security/advisories/GHSA-2fh2-ppjf-p3xv\", \"name\": \"https://github.com/CollaboraOnline/online/security/advisories/GHSA-2fh2-ppjf-p3xv\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://github.com/LibreOffice/online/blob/master/wsd/README\", \"name\": \"https://github.com/LibreOffice/online/blob/master/wsd/README\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T23:36:21.604Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-25114\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-03-12T17:23:49.855657Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-23T19:01:17.085Z\"}}], \"cna\": {\"title\": \"Sensitive Information Disclosure (JailID) to users in Collabora Online\", \"source\": {\"advisory\": \"GHSA-2fh2-ppjf-p3xv\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 2.6, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"LOW\"}}], \"affected\": [{\"vendor\": \"CollaboraOnline\", \"product\": \"online\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003e= 23.0.0, \u003c 23.05.9\"}, {\"status\": \"affected\", \"version\": \"\u003e= 22.0.0, \u003c 22.05.22\"}, {\"status\": \"affected\", \"version\": \"\u003c 21.11.9.4\"}]}], \"references\": [{\"url\": \"https://github.com/CollaboraOnline/online/security/advisories/GHSA-2fh2-ppjf-p3xv\", \"name\": \"https://github.com/CollaboraOnline/online/security/advisories/GHSA-2fh2-ppjf-p3xv\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/LibreOffice/online/blob/master/wsd/README\", \"name\": \"https://github.com/LibreOffice/online/blob/master/wsd/README\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Collabora Online is a collaborative online office suite based on LibreOffice technology. Each document in Collabora Online is opened by a separate \\\"Kit\\\" instance in a different \\\"jail\\\" with a unique directory \\\"jailID\\\" name. For security reasons, this directory name is randomly generated and should not be given out to the client. In affected versions of Collabora Online it is possible to use the CELL() function, with the \\\"filename\\\" argument, in the spreadsheet component to get a path which includes this JailID. The impact of this vulnerability in its own is low because it requires to be chained with another vulnerability. Users should upgrade to Collabora Online 23.05.9; Collabora Online 22.05.22; Collabora Online 21.11.10 or higher. There are no known workarounds for this vulnerability.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-200\", \"description\": \"CWE-200: Exposure of Sensitive Information to an Unauthorized Actor\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-03-11T21:32:12.513Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-25114\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-16T15:43:32.209Z\", \"dateReserved\": \"2024-02-05T14:14:46.379Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2024-03-11T21:32:12.513Z\", \"assignerShortName\": \"GitHub_M\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…