Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xhvv-3jww-c487

Опубликовано: 28 дек. 2023
Источник: github
Github: Прошло ревью
CVSS3: 5.2

Описание

ActiveAdmin CSV Injection leading to sensitive information disclosure

Impact

In ActiveAdmin versions prior to 3.2.0, maliciously crafted spreadsheet formulas could be uploaded as part of admin data that, when exported to a CSV file and the imported to a spreadsheet program like libreoffice, could lead to remote code execution and private data exfiltration.

The attacker would need privileges to upload data to the same ActiveAdmin application as the victim, and would need the victim to possibly ignore security warnings from their spreadsheet program.

Patches

Versions 3.2.0 and above fixed the problem by escaping any data starting with = and other characters used by spreadsheet programs.

Workarounds

Only turn on formula evaluation in spreadsheet programs when importing CSV after explicitly reviewing the file.

References

https://owasp.org/www-community/attacks/CSV_Injection https://github.com/activeadmin/activeadmin/pull/8167

Пакеты

Наименование

activeadmin

rubygems
Затронутые версииВерсия исправления

< 3.2.0

3.2.0

EPSS

Процентиль: 37%
0.0016
Низкий

5.2 Medium

CVSS3

Дефекты

CWE-1236

Связанные уязвимости

CVSS3: 9.8
nvd
около 2 лет назад

csv_builder.rb in ActiveAdmin (aka Active Admin) before 3.2.0 allows CSV injection.

EPSS

Процентиль: 37%
0.0016
Низкий

5.2 Medium

CVSS3

Дефекты

CWE-1236