admin/include/operations.php (via admin/email-harvester.php) in Chadha PHPKB Standard Multi-Language 9 allows attackers to inject untrusted input inside CSV files via the POST parameter data.
The product saves user-provided information into a Comma-Separated Value (CSV) file, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as a command when the file is opened by a spreadsheet product.
Link | Tags |
---|---|
http://antoniocannito.it/?p=137#csvinj | third party advisory exploit |
https://antoniocannito.it/phpkb1#csv-injection-cve-2020-10460 | third party advisory exploit |