This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "CSV Injection"
Timo.goosen (talk | contribs) (Created page with "CSV Excel Macro Injection also known as CEMI. Many web applications allow the user to download content such as templates for invoices or user settings to a CSV file. Many use...") |
(rewrite and add relevant links) |
||
Line 1: | Line 1: | ||
− | CSV | + | CSV Injection, also known as Formula Injection, occurs when websites embed untrusted input inside CSV files. |
− | + | When a spreadsheet program such as Microsoft Excel or LibreOffice Calc is used to open a CSV, any cells starting with '=' will be interpreted by the software as a formula. Maliciously crafted formulas can be used for three key attacks: | |
− | + | * Hijacking the user's computer by exploiting vulnerabilities in the spreadsheet software, such as CVE-2014-3524 | |
+ | * Hijacking the user's computer by exploiting the user's tendency to ignore security warnings in spreadsheets that they downloaded from their own website | ||
+ | * Exfiltrating contents from the spreadsheet, or other open spreadsheets. | ||
− | + | This attack is difficult to mitigate, and explicitly disallowed from quite a few bug bounty programs. To remediate it, ensure that no cells begin with any of the following characters: | |
− | * | + | * Equals to ("=") |
− | * | + | * Plus ("+") |
+ | * Minus ("-") | ||
+ | * At ("@") | ||
− | + | For further information, please refer to the following articles: | |
− | + | ||
− | + | *[https://www.contextis.com/resources/blog/comma-separated-vulnerabilities/ Comma Separated Vulnerabilities] | |
− | + | *[https://www.youtube.com/watch?v=SC7AkclnG2g Video showing CSV Injection against Piwik] | |
+ | *[http://georgemauer.net/2017/10/07/csv-injection.html Stealing Google Docs via CSV Injection] |
Revision as of 16:03, 26 October 2017
CSV Injection, also known as Formula Injection, occurs when websites embed untrusted input inside CSV files.
When a spreadsheet program such as Microsoft Excel or LibreOffice Calc is used to open a CSV, any cells starting with '=' will be interpreted by the software as a formula. Maliciously crafted formulas can be used for three key attacks:
- Hijacking the user's computer by exploiting vulnerabilities in the spreadsheet software, such as CVE-2014-3524
- Hijacking the user's computer by exploiting the user's tendency to ignore security warnings in spreadsheets that they downloaded from their own website
- Exfiltrating contents from the spreadsheet, or other open spreadsheets.
This attack is difficult to mitigate, and explicitly disallowed from quite a few bug bounty programs. To remediate it, ensure that no cells begin with any of the following characters:
- Equals to ("=")
- Plus ("+")
- Minus ("-")
- At ("@")
For further information, please refer to the following articles: