Loading HuntDB...

CSV Injection https://hub.grab.com

Medium
G
Grab
Submitted None

Team Summary

Official summary from Grab

@Poison had pointed out that it was possible to perform CSV Injection on `hub.grab.com` which was tested on Microsoft Excel 2016. Injection occurred by adding the payload in customer name field in Grab mobile application. The payload used was `=cmd|' /C calc'!A0`. We fixed this issue by properly sanitizing user input. On further investigation, we believe that client-side CSV injection should mitigated by the application which would be importing/interpreting data from an external source, as Microsoft Excel does (for example) by showing a warning. In other words, the proper fix should be applied when opening the CSV files, rather then when creating them. Therefore, `CSV injection` is not in scope of our bug bounty program. We would like to thank @poison again for reporting this to us and allowing us to fix this issue. we appreciate your help in keeping Grab and our customers safe and secure.

Reported by poison

Report Details

Additional information and metadata

State

Closed

Substate

Resolved

Submitted

Weakness

Command Injection - Generic