Описание
Cross-Site Scripting (XSS) vulnerability in generateNavigation() function in PhpSpreadsheet
Summary
The researcher discovered zero-day vulnerability Cross-Site Scripting (XSS) vulnerability in the code which translates the XLSX file into a HTML representation and displays it in the response.
Details
When generating the HTML from an xlsx file containing multiple sheets, a navigation menu is created. This menu includes the sheet names, which are not sanitized. As a result, an attacker can exploit this vulnerability to execute JavaScript code.
PoC
-
Create an XLSX file with multiple sheets :
-
Generate the HTML content
- Enjoy
Impact
XSS can cause a variety of problems for the end user that range in severity from an annoyance to complete account compromise. Example of impacts :
- Disclosure of the user’s session cookie, allowing an attacker to hijack the user’s session and take over the account (Only if HttpOnly cookie's flag is set to false).
- Redirecting the user to some other page or site (like phishing websites)
- Modifying the content of the current page (add a fake login page that sends credentials to the attacker).
- Automatically download malicious files.
- Requests access to the victim geolocation / camera.
- ...
Пакеты
phpoffice/phpspreadsheet
>= 3.0.0, < 3.8.0
3.8.0
phpoffice/phpspreadsheet
< 1.29.8
1.29.8
phpoffice/phpspreadsheet
>= 2.0.0, < 2.1.7
2.1.7
phpoffice/phpspreadsheet
>= 2.2.0, < 2.3.6
2.3.6
phpoffice/phpexcel
<= 1.8.2
Отсутствует
Связанные уязвимости
PhpSpreadsheet is a PHP library for reading and writing spreadsheet files. Cross-Site Scripting (XSS) vulnerability in the code which translates the XLSX file into a HTML representation and displays it in the response.
Уязвимость функции generateNavigation() PHP-библиотеки PhpSpreadsheet, позволяющая нарушителю проводить межсайтовые сценарные атаки