Persistent CSV injection

Disclosed: 2019-01-11 13:39:33 By 8r33 To semrush
Medium
Vulnerability Details
Hi Team, https://www.semrush.com/notes is vulnerable to persistent csv injection (stored csv injection) POC: 1) Login into application and open https://www.semrush.com/notes 2) click on "Add note" button 3) And enter csv injection payloads like =4+4, =HYPERLINK("http://evil.com", "EVIL") and click on save 4) and click on "Export to CSV" 5) Open the downloaded csv file 6) Observe the payload you entered in the above step Reference: https://payatu.com/csv-injection-basic-to-exploit/ ## Impact Attacker can execute kernel/OS level commands from victims machine. As it is stored at database, so users across SEMrush who ever downloads that csv file will be victims for the attacker. Also attacker can use victims to perform DDOS attack from victims machines.
Actions
View on HackerOne
Report Stats
  • Report ID: 459532
  • State: Closed
  • Substate: not-applicable
  • Upvotes: 3
Share this report