logo

CVE-2021-41824 craftcms/cms

Package

Manager: composer
Name: craftcms/cms
Vulnerable Version: >=3.4.0 <3.7.14

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.0051 pctl0.65402

Details

CSV Injection Vulnerability ### Impact In some circumstances, it was possible to export data in CSV format that could trigger a payload in old versions of Excel. If you are accepting user input from untrusted sources and will be exporting that data in CSV format from element index pages and there is a chance users will open that on old versions of Excel, then you should update. ### Patches This has been patched in Craft 3.7.14. ### References * https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3714---2021-09-28 * https://twitter.com/craftcmsupdates/status/1442928690145366018 ### For more information If you have any questions or comments about this advisory, email us at support@craftcms.com ---------- Credits: BAE Systems AI Vulnerability Research Team – Azrul Ikhwan Zulkifli

Metadata

Created: 2021-10-18T19:04:16Z
Modified: 2021-10-18T19:11:00Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/10/GHSA-h7vq-5qgw-jwwq/GHSA-h7vq-5qgw-jwwq.json
CWE IDs: ["CWE-1236"]
Alternative ID: GHSA-h7vq-5qgw-jwwq
Finding: F090
Auto approve: 1