2020-01-02 21:01:04 +00:00
{
"CVE_data_meta" : {
2020-06-03 15:21:40 -06:00
"ASSIGNER" : "security-advisories@github.com" ,
2020-01-02 21:01:04 +00:00
"ID" : "CVE-2020-5299" ,
2020-06-03 15:21:40 -06:00
"STATE" : "PUBLIC" ,
"TITLE" : "Potential CSV Injection vector in OctoberCMS"
2020-01-02 21:01:04 +00:00
} ,
2020-06-03 15:21:40 -06:00
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "october" ,
"version" : {
"version_data" : [
{
"version_value" : ">= 1.0.319, < 1.0.466"
}
]
}
}
]
} ,
"vendor_name" : "octobercms"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
2020-01-02 21:01:04 +00:00
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2020-06-03 23:01:29 +00:00
"value" : "In OctoberCMS (october/october composer package) versions from 1.0.319 and before 1.0.466, any users with the ability to modify any data that could eventually be exported as a CSV file from the `ImportExportController` could potentially introduce a CSV injection into the data to cause the generated CSV export file to be malicious. This requires attackers to achieve the following before a successful attack can be completed: 1. Have found a vulnerability in the victims spreadsheet software of choice. 2. Control data that would potentially be exported through the `ImportExportController` by a theoretical victim. 3. Convince the victim to export above data as a CSV and run it in vulnerable spreadsheet software while also bypassing any sanity checks by said software. Issue has been patched in Build 466 (v1.0.466)."
2020-01-02 21:01:04 +00:00
}
]
2020-06-03 15:21:40 -06:00
} ,
"impact" : {
"cvss" : {
"attackComplexity" : "HIGH" ,
"attackVector" : "NETWORK" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 4 ,
"baseSeverity" : "MEDIUM" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"scope" : "CHANGED" ,
"userInteraction" : "REQUIRED" ,
"vectorString" : "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N" ,
"version" : "3.1"
}
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"name" : "https://github.com/octobercms/october/security/advisories/GHSA-4rhm-m2fp-hx7q" ,
"refsource" : "CONFIRM" ,
"url" : "https://github.com/octobercms/october/security/advisories/GHSA-4rhm-m2fp-hx7q"
} ,
{
"name" : "https://github.com/octobercms/library/commit/c84bf03f506052c848f2fddc05f24be631427a1a" ,
"refsource" : "MISC" ,
"url" : "https://github.com/octobercms/library/commit/c84bf03f506052c848f2fddc05f24be631427a1a"
} ,
{
"name" : "https://github.com/octobercms/october/commit/802d8c8e09a2b342649393edb6d3ceb958851484" ,
"refsource" : "MISC" ,
"url" : "https://github.com/octobercms/october/commit/802d8c8e09a2b342649393edb6d3ceb958851484"
2020-08-03 19:01:23 +00:00
} ,
{
"refsource" : "MISC" ,
"name" : "http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html" ,
"url" : "http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-Injection.html"
2020-08-04 12:01:23 +00:00
} ,
{
"refsource" : "FULLDISC" ,
"name" : "20200804 October CMS <= Build 465 Multiple Vulnerabilities - Arbitrary File Read" ,
"url" : "http://seclists.org/fulldisclosure/2020/Aug/2"
2020-06-03 15:21:40 -06:00
}
]
} ,
"source" : {
"advisory" : "GHSA-4rhm-m2fp-hx7q" ,
"discovery" : "UNKNOWN"
2020-01-02 21:01:04 +00:00
}
}