vendor:
Knockpy
by:
Dolev Farhi
8.8
CVSS
HIGH
CSV Injection
74
CWE
Product Name: Knockpy
Affected Version From: 4.1.1
Affected Version To: 4.1.1
Patch Exists: YES
Related CWE: N/A
CPE: a:guelfoweb:knockpy:4.1.1
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Debian 9.13
2020
Knockpy 4.1.1 – CSV Injection
Knockpy, as part of its subdomain brute forcing flow of a remote domain, issues a HEAD request to the server to fetch details such as headers, status code, etc. The data then gets reflected when issuing the -c flag to store as a CSV file with the Server HTTP Response Header unfiltered. An attacker can inject malicious Nginx config to return CSV formula headers, which can be used to inject malicious code into the CSV file.
Mitigation:
Ensure that user input is properly sanitized and validated before being used in the CSV file.