{"id":"CVE-2018-6871","details":"LibreOffice before 5.4.5 and 6.x before 6.0.1 allows remote attackers to read arbitrary files via =WEBSERVICE calls in a document, which use the COM.MICROSOFT.WEBSERVICE function.","modified":"2026-04-16T06:22:03.645719225Z","published":"2018-02-09T06:29:00.303Z","related":["SUSE-SU-2018:0428-1","SUSE-SU-2018:0443-1","SUSE-SU-2018:1076-1"],"references":[{"type":"ADVISORY","url":"https://usn.ubuntu.com/3579-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4111"},{"type":"ADVISORY","url":"https://www.libreoffice.org/about-us/security/advisories/cve-2018-1055/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0418"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:0517"},{"type":"FIX","url":"https://cgit.freedesktop.org/libreoffice/core/commit/?h=libreoffice-5-4-5&id=a916fc0c0e0e8b10cb4158fa0fa173fe205d434a"},{"type":"EVIDENCE","url":"https://github.com/jollheef/libreoffice-remote-arbitrary-file-disclosure"},{"type":"EVIDENCE","url":"https://www.exploit-db.com/exploits/44022/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libreoffice/core","events":[{"introduced":"0"},{"fixed":"79c9829dd5d8054ec39a82dc51cd9eff340dbee8"},{"introduced":"0"},{"last_affected":"dc89aa7a9eabfd848af146d5086077aeed2ae4a5"},{"introduced":"0"},{"last_affected":"626ea4e62a3e5005fe9825923a1c0c5bdb61cc08"},{"introduced":"0"},{"last_affected":"dc89aa7a9eabfd848af146d5086077aeed2ae4a5"},{"introduced":"0"},{"last_affected":"626ea4e62a3e5005fe9825923a1c0c5bdb61cc08"},{"introduced":"0"},{"last_affected":"c94961c6869c34b3874d21cfaa5ec1488609acfe"},{"introduced":"0"},{"last_affected":"3a0801282a0aabc64a15f9afc3aedeac6226a979"},{"introduced":"0"},{"last_affected":"c94961c6869c34b3874d21cfaa5ec1488609acfe"},{"introduced":"0"},{"last_affected":"1c629ca0048670db4bed5e7d8d76bcf8e81f2158"},{"introduced":"0"},{"last_affected":"3a0801282a0aabc64a15f9afc3aedeac6226a979"},{"introduced":"0"},{"last_affected":"c94961c6869c34b3874d21cfaa5ec1488609acfe"},{"introduced":"0"},{"last_affected":"3a0801282a0aabc64a15f9afc3aedeac6226a979"},{"introduced":"0"},{"last_affected":"dc89aa7a9eabfd848af146d5086077aeed2ae4a5"},{"introduced":"0"},{"last_affected":"626ea4e62a3e5005fe9825923a1c0c5bdb61cc08"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"5.4.5"},{"introduced":"0"},{"last_affected":"6.0"},{"introduced":"0"},{"last_affected":"7.0"},{"introduced":"0"},{"last_affected":"6.0"},{"introduced":"0"},{"last_affected":"7.0"},{"introduced":"0"},{"last_affected":"7.4"},{"introduced":"0"},{"last_affected":"7.6"},{"introduced":"0"},{"last_affected":"7.4"},{"introduced":"0"},{"last_affected":"7.5"},{"introduced":"0"},{"last_affected":"7.6"},{"introduced":"0"},{"last_affected":"7.4"},{"introduced":"0"},{"last_affected":"7.6"},{"introduced":"0"},{"last_affected":"6.0"},{"introduced":"0"},{"last_affected":"7.0"}]}}],"versions":["MELD_LIBREOFFICE_REPOS","cp-6.0-branch-point","gpg4libre-review-5.4.99","libreoffice-3-5-branch-point","libreoffice-3-6-branch-point","libreoffice-3.5.0.0","libreoffice-4-0-branch-point","libreoffice-4-1-branch-point","libreoffice-4-2-branch-point","libreoffice-4-2-milestone-1","libreoffice-4-3-branch-point","libreoffice-4-4-branch-point","libreoffice-5-0-branch-point","libreoffice-5-1-branch-point","libreoffice-5-2-branch-point","libreoffice-5-3-branch-point","libreoffice-5-4-branch-point","libreoffice-6-0-branch-point","libreoffice-6-1-branch-point","libreoffice-6-2-branch-point","libreoffice-6-3-branch-point","libreoffice-6-4-branch-point","libreoffice-6.0.7.3","libreoffice-7-0-branch-point","libreoffice-7-1-branch-point","libreoffice-7-2-branch-point","libreoffice-7-3-branch-point","libreoffice-7-4-branch-point","libreoffice-7-5-branch-point","libreoffice-7-6-branch-point","mimo-6-0-branch-point","mimo-7-0-branch-point","mimo-7-6-branch-point","sdremote-2.0.0","windows_build_successful_2011_11_08"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"6.0.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.0-alpha1"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.0-beta1"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.0-beta2"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"17.10"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-6871.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}