Описание
ghas-to-csv vulnerable to Improper Neutralization of Formula Elements in a CSV File
Impact
This GitHub Action creates a CSV file without sanitizing the output of the APIs. If an alert is dismissed or any other custom field contains executable code / formulas, it might be run when an endpoint opens that CSV file in a spreadsheet program. The data flow looks like this 👇🏻
Patches
Please use version v1 or later. That tag moves from using csv to defusedcsv to mitigate this problem.
Workarounds
There is no workaround. Please upgrade to using the latest tag, v1 (or later).
References
- CWE-1236 information from MITRE
- CSV injection information from OWASP
- CodeQL query for CWE-1236 in Python here
- PyPI site for
defusedcsvhere
For more information
If you have any questions or comments about this advisory:
- Open an issue in this repository here
Ссылки
- https://github.com/some-natalie/ghas-to-csv/security/advisories/GHSA-634p-93h9-92vh
- https://nvd.nist.gov/vuln/detail/CVE-2022-39217
- https://github.com/some-natalie/ghas-to-csv/issues/19
- https://github.com/some-natalie/ghas-to-csv/pull/20
- https://github.com/some-natalie/ghas-to-csv/commit/d0b521928fa734513b5cd9c7d9d8e09db50e884a
Пакеты
some-natalie/ghas-to-csv
< 1
1
Связанные уязвимости
some-natalie/ghas-to-csv (GitHub Advanced Security to CSV) is a GitHub action which scrapes the GitHub Advanced Security API and shoves it into a CSV. In affected versions this GitHub Action creates a CSV file without sanitizing the output of the APIs. If an alert is dismissed or any other custom field contains executable code / formulas, it might be run when an endpoint opens that CSV file in a spreadsheet program. This issue has been addressed in version `v1`. Users are advised to use `v1` or later. There are no known workarounds for this issue.