Analysis:
During the analysis, it was observed that there was functionality to export the data in a CSV file and this functionality was affected by the CSV injection vulnerability, also known as Formulae Injection. We could execute a malicious command.
Impact:
Successful exploitation will allow an attacker to execute arbitrary code with the privilege of a currently logged-in user of the system, causing serious damage to the victim’s system like an entire partition can be wiped out or create backdoors as well for later access. Also, an attacker can steal sensitive information from CSV files.
Recommendation:
We recommend that it is always a good practice not to trust user inputs. Also, for the successful execution of the formula, the attacker will have to use the ‘-‘ , ‘=’ , '@', and the pipe (|) is used to execute the binary in the excel software. Hence, it is strongly recommended to whitelist the input and not allow ‘- ‘, ‘|’ , ‘+’, '@', and ‘=’ to mitigate this vulnerability.
Comments
Post a Comment