Loading HuntDB...

CSV injection in gratipay.com via payment history export feature.

Medium
G
Gratipay
Submitted None
Reported by edoverflow

Vulnerability Details

Technical details and impact analysis

Command Injection - Generic
I discovered this issues thanks to Matt who pointed out that the participant's name is directly placed into a CSV file: https://github.com/gratipay/gratipay.com/issues/4399#issuecomment-292250609 # Summary --- Gratipay allows users to export payment history as a .csv file. By injecting a payload into a participant's name an attacker could exfiltrate data or execute code on the target machine. For instance, with `=cmd|' /C calc'!A0` I am able to open up `calc.exe` on Windows. # Steps to reproduce --- 1) Create a user A called `=cmd|' /C calc'!A0`; 2) User B donates a small sum to user A; 3) Export payment history from B; 4) Open the .csv file on a Windows machine. Result: `calc.exe` pops up. # Fix --- Prefix `=`, `+`, `-` and `@` symbols with a `'` in issues when exporting them to a .csv file.

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Command Injection - Generic