Loading HuntDB...

Persistent CSV injection

Medium
S
Semrush
Submitted None
Reported by 8r33

Vulnerability Details

Technical details and impact analysis

Hi Team, https://www.semrush.com/notes is vulnerable to persistent csv injection (stored csv injection) POC: 1) Login into application and open https://www.semrush.com/notes 2) click on "Add note" button 3) And enter csv injection payloads like =4+4, =HYPERLINK("http://evil.com", "EVIL") and click on save 4) and click on "Export to CSV" 5) Open the downloaded csv file 6) Observe the payload you entered in the above step Reference: https://payatu.com/csv-injection-basic-to-exploit/ ## Impact Attacker can execute kernel/OS level commands from victims machine. As it is stored at database, so users across SEMrush who ever downloads that csv file will be victims for the attacker. Also attacker can use victims to perform DDOS attack from victims machines.

Report Details

Additional information and metadata

State

Closed

Substate

Not-Applicable

Submitted