Any users with the ability to modify any data that could eventually be exported as a CSV file from the ImportExportController
could potentially introduce a CSV injection into the data to cause the generated CSV export file to be malicious. This requires attackers to achieve the following before a successful attack can be completed:
ImportExportController
by a theoretical victim.Issue has been patched in Build 466 (v1.0.466).
Apply https://github.com/octobercms/library/commit/c84bf03f506052c848f2fddc05f24be631427a1a & https://github.com/octobercms/october/commit/802d8c8e09a2b342649393edb6d3ceb958851484 to your installation manually if unable to upgrade to Build 466.
Reported by @chrisvidal initially & Sivanesh Ashok later.
If you have any questions or comments about this advisory: * Email us at hello@octobercms.com
Given the number of hoops that a potential attacker would have to jump through, this vulnerability really boils down to the possibility of abusing the trust that a user may have in the export functionality of the project. Thus, this has been rated low severity as it requires vulnerabilities to also exist in other software used by any potential victims as well as successful social engineering attacks.
{ "nvd_published_at": "2020-06-03T22:15:00Z", "github_reviewed_at": "2020-06-03T21:26:57Z", "severity": "MODERATE", "github_reviewed": true, "cwe_ids": [ "CWE-77" ] }