logo

CVE-2023-51763 activeadmin

Package

Manager: gem
Name: activeadmin
Vulnerable Version: >=0 <3.2.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L

CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L

EPSS: 0.00122 pctl0.32028

Details

ActiveAdmin CSV Injection leading to sensitive information disclosure ### Impact In ActiveAdmin versions prior to 3.2.0, maliciously crafted spreadsheet formulas could be uploaded as part of admin data that, when exported to a CSV file and the imported to a spreadsheet program like libreoffice, could lead to remote code execution and private data exfiltration. The attacker would need privileges to upload data to the same ActiveAdmin application as the victim, and would need the victim to possibly ignore security warnings from their spreadsheet program. ### Patches Versions 3.2.0 and above fixed the problem by escaping any data starting with `=` and other characters used by spreadsheet programs. ### Workarounds Only turn on formula evaluation in spreadsheet programs when importing CSV after explicitly reviewing the file. ### References https://owasp.org/www-community/attacks/CSV_Injection https://github.com/activeadmin/activeadmin/pull/8167

Metadata

Created: 2023-12-28T18:45:30Z
Modified: 2023-12-28T18:45:30Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/12/GHSA-xhvv-3jww-c487/GHSA-xhvv-3jww-c487.json
CWE IDs: ["CWE-1236"]
Alternative ID: GHSA-xhvv-3jww-c487
Finding: F090
Auto approve: 1