vendor:
Tendenci
by:
Mufaddal Masalawala
6.5
CVSS
MEDIUM
CSV Injection
89
CWE
Product Name: Tendenci
Affected Version From: 12.3.1
Affected Version To: 12.3.1
Patch Exists: NO
Related CWE: N/A
CPE: a:tendenci:tendenci:12.3.1
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Kali Linux 2020.3
2020
Tendenci 12.3.1 – CSV/ Formula Injection
CSV Injection (aka Excel Macro Injection or Formula Injection) exists in Contact Us feature in Tendenci v12.3.1 via message field that is mistreated while exporting to a CSV file. To exploit this vulnerability: 1. Go to contact us page and enter the payload '=10+20+cmd|' /C calc'!A0' in the message field and submit the form 2. Login to the application and go to Forms section and export the contact us form entries 3. Click on Export and save the CSV file downloaded 4. Open the CSV file, allow all popups and our payload is executed (calculator is opened).
Mitigation:
Input validation should be done to prevent CSV injection attacks.