{ "id": "CVE-2021-41128", "sourceIdentifier": "security-advisories@github.com", "published": "2021-10-06T18:15:11.067", "lastModified": "2024-11-21T06:25:32.143", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Hygeia is an application for collecting and processing personal and case data in connection with communicable diseases. In affected versions all CSV Exports (Statistics & BAG MED) contain a CSV Injection Vulnerability. Users of the system are able to submit formula as exported fields which then get executed upon ingestion of the exported file. There is no validation or sanitization of these formula fields and so malicious may construct malicious code. This vulnerability has been resolved in version 1.30.4. There are no workarounds and all users are advised to upgrade their package." }, { "lang": "es", "value": "Hygeia es una aplicaci\u00f3n para recoger y procesar datos personales y de casos en relaci\u00f3n con las enfermedades transmisibles. En las versiones afectadas, todas las exportaciones CSV (Statistics & BAG MED) contienen una vulnerabilidad de inyecci\u00f3n CSV. Los usuarios del sistema pueden enviar f\u00f3rmulas como campos exportados que luego se ejecutan al ingerir el archivo exportado. No se presenta comprobaci\u00f3n ni saneo de estos campos de f\u00f3rmulas, por lo que maliciosos pueden construir c\u00f3digo malicioso. Esta vulnerabilidad ha sido resuelta en la versi\u00f3n 1.30.4. No se presentan soluciones y se recomienda a todos los usuarios que actualicen su paquete" } ], "metrics": { "cvssMetricV31": [ { "source": "security-advisories@github.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L", "baseScore": 9.1, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "LOW" }, "exploitabilityScore": 3.1, "impactScore": 5.3 }, { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 5.9 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "security-advisories@github.com", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-74" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:hygeia_project:hygeia:*:*:*:*:*:*:*:*", "versionStartIncluding": "1.11.0", "versionEndExcluding": "1.30.4", "matchCriteriaId": "F7DDCC54-C4E6-4E39-8F2B-AE90486E8AC1" } ] } ] } ], "references": [ { "url": "https://github.com/beatrichartz/csv/issues/103", "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ] }, { "url": "https://github.com/beatrichartz/csv/pull/104", "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://github.com/jshmrtn/hygeia/commit/d917f27432fe84e1c9751222ae55bae36a4dce60", "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ] }, { "url": "https://github.com/jshmrtn/hygeia/security/advisories/GHSA-8pwv-jhj2-2369", "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ] }, { "url": "https://owasp.org/www-community/attacks/CSV_Injection", "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://github.com/beatrichartz/csv/issues/103", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ] }, { "url": "https://github.com/beatrichartz/csv/pull/104", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ] }, { "url": "https://github.com/jshmrtn/hygeia/commit/d917f27432fe84e1c9751222ae55bae36a4dce60", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ] }, { "url": "https://github.com/jshmrtn/hygeia/security/advisories/GHSA-8pwv-jhj2-2369", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ] }, { "url": "https://owasp.org/www-community/attacks/CSV_Injection", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ] } ] }