header-logo
Suggest Exploit
vendor:
Blog Master Pro
by:
8bitsec
8.8
CVSS
HIGH
CSV Injection
78
CWE
Product Name: Blog Master Pro
Affected Version From: 1.0
Affected Version To: 1.0
Patch Exists: YES
Related CWE: CVE-2018-10255
CPE: a:codecanyon:blog_master_pro:1.0
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Kali Linux 2.0, Mac OS 10.13
2018

Blog Master Pro v1.0 – CSV Injection

A user is able to inject a command that will be included in the exported CSV file. To exploit this vulnerability, a user must login with regular user's credentials, add =cmd|'/C calc'!A1 as a comment on any article, log in with admin's credentials, browse to Dashboard > Comments, click on the CSV button to download and open the exported CSV file, and the command will be executed.

Mitigation:

Upgrade to version 1.1 or later.
Source

Exploit-DB raw data:

# Exploit Title: Blog Master Pro v1.0 - CSV Injection
# Date: 2018-04-23
# Exploit Author: 8bitsec
# CVE: CVE-2018-10255
# Vendor Homepage: https://codecanyon.net/
# Software Link: https://codecanyon.net/item/blog-master-pro/21689781
# Version: 1.0
# Tested on: [Kali Linux 2.0 | Mac OS 10.13]

Release Date:
=============
2018-04-23

Product & Service Introduction:
===============================
This application based on new Latest Laravel 5.5 Framework that allows web site owners to quickly add blog post, manage author and user, manage comments, manage website, manage profile and allow to create category and tag. 
It is designed latest security and code standards and it is ready for high availability web sites.

Technical Details & Description:
================================

A user is able to inject a command that will be included in the exported CSV file.

Proof of Concept (PoC):
=======================

1. Login with regular user's credentials
2. Add =cmd|'/C calc'!A1 as a comment on any article
3. Log in with admin's credentials
4. Browse to Dashboard > Comments
5. Click on the CSV button to download and open the exported CSV file