Skip to content

CSV Import / Export lacks validation and allows allows executable code to be added to uploaded / downloaded #174

@GeekInTheNorth

Description

@GeekInTheNorth

We have had an issue raised in a penetration test which proved that there was a CSV Injection attack possible on the CSV import / export functionality of this Add-On.

How to Reproduce:

  • Import redirects using a CSV which contains a CSV injection attack within one of the URL fields.
  • Export redirects into a CSV file
  • Open the CSV file in excel

The penetration tester was able to use CSV injection to push a powershell command into the database, when the CSV was then exported and opened in excel, the powershell script executed to download a file to the system.

This can be fixed by adding a simple URL validation for the Old and New URL fields and rejecting the CSV if any of the entries are invalid.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions