This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "CSV Injection"
m (Albinowax moved page CSV Excel Macro Injection to CSV Injection: misleading name) |
(add to appropriate categories) (Tag: Visual edit) |
||
Line 17: | Line 17: | ||
*[https://www.youtube.com/watch?v=SC7AkclnG2g Video showing CSV Injection against Piwik] | *[https://www.youtube.com/watch?v=SC7AkclnG2g Video showing CSV Injection against Piwik] | ||
*[http://georgemauer.net/2017/10/07/csv-injection.html Stealing Google Docs via CSV Injection] | *[http://georgemauer.net/2017/10/07/csv-injection.html Stealing Google Docs via CSV Injection] | ||
+ | [[Category:Vulnerability]] | ||
+ | [[Category:Attack]] |
Latest revision as of 16:09, 26 October 2017
CSV Injection, also known as Formula Injection, occurs when websites embed untrusted input inside CSV files.
When a spreadsheet program such as Microsoft Excel or LibreOffice Calc is used to open a CSV, any cells starting with '=' will be interpreted by the software as a formula. Maliciously crafted formulas can be used for three key attacks:
- Hijacking the user's computer by exploiting vulnerabilities in the spreadsheet software, such as CVE-2014-3524
- Hijacking the user's computer by exploiting the user's tendency to ignore security warnings in spreadsheets that they downloaded from their own website
- Exfiltrating contents from the spreadsheet, or other open spreadsheets.
This attack is difficult to mitigate, and explicitly disallowed from quite a few bug bounty programs. To remediate it, ensure that no cells begin with any of the following characters:
- Equals to ("=")
- Plus ("+")
- Minus ("-")
- At ("@")
For further information, please refer to the following articles: