vendor:
ChurchCRM
by:
Mufaddal Masalawala
6.5
CVSS
MEDIUM
CSV Injection
89
CWE
Product Name: ChurchCRM
Affected Version From: 4.2.0
Affected Version To: 4.2.1
Patch Exists: NO
Related CWE: N/A
CPE: a:churchcrm:churchcrm:4.2.1
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Kali Linux 2020.3
2020
Exploit Title: ChurchCRM 4.2.1- CSV/Formula Injection
CSV Injection (aka Excel Macro Injection or Formula Injection) exists in List Event Types feature in ChurchCRM v4.2.0 via Name field that is mistreated while exporting to a CSV file. To exploit this vulnerability: 1. Login to the application, goto 'Events' module and then 'List Event Types' 2. Edit any event and inject the payload =10+20+cmd|' /C calc'!A0 in the 'Name' field 3. Now goto 'List Event types' module and click CSV to download the CSV file 4. Open the CSV file, allow all popups and our payload is executed (calculator is opened).
Mitigation:
Input validation should be done to prevent malicious payloads from being injected into the application.