CSV Injection at the CSV export feature

Disclosed: 2019-04-08 19:03:12 By niemand_sec To security
Low
Vulnerability Details
Hi there, I have find a way to bypass the mitigation done in [#72785](https://hackerone.com/reports/72785) and [#111192](https://hackerone.com/reports/111192). What happens if an attacker creates a Ticket with the Tittle `":";-3+3+cmd|' /C calc'!D2`. The ; will break the field making excel think that there are two fields. Although, you are using "" to encapsulate a field and , to separate them, its possible to break one field in two. Normal case: `118470,333333,open,new,Denial of Service,2016-02-24 17:43:52 UTC,,,,,,perra,,no,,` Case where the field is splitted: `118555,"'"":"";-3+3+cmd|' /C calc'!D2",open,new,"Design Issue,Missing Best Practice",2016-02-24 19:31:14 UTC,,,,,,perra,,no,,` Once the CSV is create excel will ignore the " and split the field into two by taking into account the ;. I have tried in: * Excel Office 2013 on W8.1 * Excel Office 2016 on windows 10 In all cases the code got executed. I attach one picture with the executed code. To Reproduce the issue: 1- Create a Ticket with the following name `":";-3+3+cmd|' /C calc'!D2`. 2- Export it to CSV 3- Open the CSV. Check attached picture to see the executed code. If you have further question do not hesitate to ask me. Best, ███████
Actions
View on HackerOne
Report Stats
  • Report ID: 118582
  • State: Closed
  • Substate: resolved
  • Upvotes: 11
Share this report