CSV Injection with the CSV export feature
Low
C
Chaturbate
Submitted None
Actions:
Reported by
hackaccinocraft
Vulnerability Details
Technical details and impact analysis
Hi there,
hope you are well,
The "Download as a CSV" feature of ``` does not properly "escape" fields. So that particular field is vulnerable to CSV injection.
**Steps of POC**
Step 1 : Go to any chat room and donate any token to some and in note insert ```=4+4```.
Step 2 : Now go to on this link and download transaction history.
Step 3 : Download file as CSV and open it you can =4+4 become 8 so it's prove CSV injection.
**POC video**
███
Malicious user can take big advantage of this vulnerability because from that vulnerability we can run base OS command on any anonymous user account.
**Prevention**
Strip "=" only, it's not foolproof fix, see this report [#72785](https://hackerone.com/reports/72785) you have to strip +/-/@ and | as well.
Reference,
https://hackerone.com/reports/72785
https://hackerone.com/reports/223344
https://hackerone.com/reports/244292
Please let me know if you want more information regarding this report.
Cheers,
Ninjan
## Impact
This vulnerability can be harm for normal user because if malicious user injected any malicious script in token note and when customer user download CSV file then inserted command directly runs when CSV file open.
Report Details
Additional information and metadata
State
Closed
Substate
Resolved
Submitted
Weakness
OS Command Injection