header-logo
Suggest Exploit
vendor:
projectSend
by:
Mirabbas Agalarov
7.5
CVSS
HIGH
CSV Injection
78
CWE
Product Name: projectSend
Affected Version From: r1605
Affected Version To: r1605
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Windows
2023

projectSend r1605 – CSV injection

CSV injection vulnerability in projectSend r1605 allows remote attackers to execute arbitrary commands via a crafted payload in a CSV file. An attacker can exploit this vulnerability by creating a malicious CSV file containing a payload that will be executed when opened by an administrator using the Export action-log functionality.

Mitigation:

To mitigate this vulnerability, it is recommended to sanitize user input before using it to generate CSV files. Additionally, restrict access to the Export action-log functionality to trusted users only.
Source

Exploit-DB raw data:

Exploit Title: projectSend r1605 - CSV injection
Version: r1605
Bugs:  CSV Injection
Technology: PHP
Vendor URL: https://www.projectsend.org/
Software Link: https://www.projectsend.org/
Date of found: 11-06-2023
Author: Mirabbas Ağalarov
Tested on: Windows


2. Technical Details & POC
========================================
Step 1. login as user
step 2. Go to My Account ( http://localhost/users-edit.php?id=2 )
step 3. Set name as  =calc|a!z|
step 3. If admin Export action-log as CSV  file ,in The computer of admin  occurs csv injection and will open calculator ( http://localhost/actions-log.php )

payload: =calc|a!z|