CSV Injection (aka Excel Macro Injection or Formula Injection) in /lib/plugins/usermanager/admin.php in DokuWiki 2018-04-22a and earlier allows remote attackers to exfiltrate sensitive data and to execute arbitrary code via a value that is mishandled in a CSV export. NOTE: the vendor has stated "this is not a security problem in DokuWiki.
The product saves user-provided information into a Comma-Separated Value (CSV) file, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as a command when the file is opened by a spreadsheet product.
Link | Tags |
---|---|
https://github.com/splitbrain/dokuwiki/issues/2450 | issue tracking exploit third party advisory |
https://www.sec-consult.com/en/blog/advisories/dokuwiki-csv-formula-injection-vulnerability/ | third party advisory exploit |
https://seclists.org/fulldisclosure/2018/Sep/4 | mailing list exploit third party advisory |
https://www.patreon.com/posts/unfixed-security-21250652 |