cve/2023/CVE-2023-7101.md

22 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-7101](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7101)
![](https://img.shields.io/static/v1?label=Product&message=Spreadsheet%3A%3AParseExcel&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20('Eval%20Injection')&color=brighgreen)
### Description
Spreadsheet::ParseExcel version 0.65 is a Perl module used for parsing Excel files. Spreadsheet::ParseExcel is vulnerable to an arbitrary code execution (ACE) vulnerability due to passing unvalidated input from a file into a string-type “eval”. Specifically, the issue stems from the evaluation of Number format strings (not to be confused with printf-style format strings) within the Excel parsing logic.
### POC
#### Reference
- https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md
- https://https://github.com/haile01/perl_spreadsheet_excel_rce_poc
2024-05-28 08:49:17 +00:00
- https://security.metacpan.org/2024/02/10/vulnerable-spreadsheet-parsing-modules.html
2024-05-25 21:48:12 +02:00
#### Github
- https://github.com/Ostorlab/KEV
2024-05-28 08:49:17 +00:00
- https://github.com/fkie-cad/nvd-json-data-feeds
2024-05-25 21:48:12 +02:00
- https://github.com/vinzel-ops/vuln-barracuda