### [CVE-2023-7101](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7101) ![](https://img.shields.io/static/v1?label=Product&message=Spreadsheet%3A%3AParseExcel&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-95%3A%20Improper%20Neutralization%20of%20Directives%20in%20Dynamically%20Evaluated%20Code%20('Eval%20Injection')&color=brighgreen) ### Description Spreadsheet::ParseExcel version 0.65 is a Perl module used for parsing Excel files. Spreadsheet::ParseExcel is vulnerable to an arbitrary code execution (ACE) vulnerability due to passing unvalidated input from a file into a string-type “eval”. Specifically, the issue stems from the evaluation of Number format strings (not to be confused with printf-style format strings) within the Excel parsing logic. ### POC #### Reference - https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md - https://https://github.com/haile01/perl_spreadsheet_excel_rce_poc - https://security.metacpan.org/2024/02/10/vulnerable-spreadsheet-parsing-modules.html #### Github - https://github.com/Ostorlab/KEV - https://github.com/fkie-cad/nvd-json-data-feeds - https://github.com/vinzel-ops/vuln-barracuda