This affects all versions of package html-to-csv. When there is a formula embedded in a HTML page, it gets accepted without any validation and the same would be pushed while converting it into a CSV file. Through this a malicious actor can embed or generate a malicious link or execute commands via CSV files.
The product saves user-provided information into a Comma-Separated Value (CSV) file, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as a command when the file is opened by a spreadsheet product.
Link | Tags |
---|---|
https://snyk.io/vuln/SNYK-PYTHON-HTMLTOCSV-1582784 | third party advisory exploit |
https://github.com/hanwentao/html2csv/blob/master/html2csv/converter.py | third party advisory exploit |