cve/2024/CVE-2024-41226.md

20 lines
1.3 KiB
Markdown
Raw Normal View History

2024-08-07 19:02:05 +00:00
### [CVE-2024-41226](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41226)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
2025-09-29 16:08:36 +00:00
** DISPUTED ** A CSV injection vulnerability in Automation Anywhere Automation 360 version 21094 allows attackers to execute arbitrary code via a crafted payload. NOTE: Automation Anywhere disputes this report, arguing the attacker executes everything from the client side and does not attack the Control Room. The payload is being injected in the http Response from the client-side, so the owner of the Response and payload is the end user in this case. They contend that the server's security controls have no impact or role to play in this situation and therefore this is not a valid vulnerability.
2024-08-07 19:02:05 +00:00
### POC
#### Reference
2025-09-29 16:08:36 +00:00
- https://medium.com/%40aksalsalimi/cve-2024-41226-response-manipulation-led-to-csv-injection-9ae3182dcc02
2024-08-07 19:02:05 +00:00
- https://medium.com/@aksalsalimi/cve-2024-41226-response-manipulation-led-to-csv-injection-9ae3182dcc02
#### Github
2025-09-29 16:08:36 +00:00
- https://github.com/aksalsalimi/aksalsalimi
2024-08-07 19:02:05 +00:00
- https://github.com/fkie-cad/nvd-json-data-feeds