CSV Injection with the CVS export feature - Glossary

Disclosed: 2017-05-17 14:19:37 By amsda To weblate
Low
Vulnerability Details
Hi, The "Download as a CSV" feature of Weblate does not properly "escape" fields. Here is more information about this issue: http://www.contextis.com/resources/blog/comma-separated-vulnerabilities/ Here is one method to reproduce this issue: 1) I can add new information in Glossary with a name starting with "=1+1;" or "-2+3+cmd|' /C calc'!G2;" 2) I choose to export all Glossary to CSV containing the issue in (1) 3) I now open this CSV file in excel or another spreadsheet program 4) You can see the cell containing the issue name in (1) is displayed as "2" (=1+1;) which means the code is executed.
Actions
View on HackerOne
Report Stats
  • Report ID: 224291
  • State: Closed
  • Substate: resolved
  • Upvotes: 4
Share this report