Issue Description

SSRF with root permissions in Webdesktop document management system.


Webdesktop includes functionality to convert documents into PDF format. LibreOffice is used for conversion process. There are couple of problems with this approach:

  • LibreOffice process listening on TCP:8100 runs as root user, although www-data can access all neccesary files
  • LibreOffice ODT XML can include file from disk into the document

Affected versions

Tested on version 5.1.15 (latest)


Ordinary user can create recods and upload files assosiated with that record. Uploading ODT containing following section:

<office:text><text:section text:name="string"><text:section-source
xlink:href="file:///etc/shadow" xlink:type="simple" xlink:show="embed"

Will force LibreOffice to include the file specified in XML into the document when ODT to PDF conversion takes place in server.

Server runs LibreOffice as root:

# ps axu|grep -i office
root       594  0.0  0.0 177832  4856 ?        Ssl  dets 11   0:01 /usr/lib/libreoffice/program/oosplash --headless --nologo --accept=socket,port=8100;urp; --pidfile=/run/
root       716  7.9  1.6 1135476 272464 ?      Sl   dets 11 690:31 /usr/lib/libreoffice/program/soffice.bin --headless --nologo --accept=socket,port=8100;urp; --pidfile=/run/
root     15923  0.0  0.0   8752   824 pts/1    S+   18:57   0:00 grep -i office

Uploaded malicious ODT document into the system:

Converting into PDF:

PDF available to user:

PDF preview contains /etc/shadow from the server filesystem:


Malicious user can read any file (must know the file name) from the server. This includes:

  • Configuration files which contain passwords (application configuration file contains DB passwords)
  • Private ssh keys
  • .bash_history files
  • Private keys for webserver


Vendor notified 18.12.2020
Fix released 21.12.2020

CVE-2021-3204 was issued