# csv-plus_vulnerability **Repository Path**: kenyons/csv-plus_vulnerability ## Basic Information - **Project Name**: csv-plus_vulnerability - **Description**: No description available - **Primary Language**: Unknown - **License**: Not specified - **Default Branch**: main - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2022-02-15 - **Last Updated**: 2022-02-15 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # csv-plus_vulnerability 👻 2-Click Arbitrary Code Execution Vulnerability. ![PoC.gif](files/PoC.gif) CVE-2022-21241 ⚠ **This PoC was created to alert users and investigate vulnerabilities in their own CSV+, and is prohibited to be used for attacks.** ## Vulnerability The following versions are vulnerable. - CSV+ <= 0.8.0 Attackers can execute arbitrary code by using the Node.js functionality. They will place the malicious js code on some site and link it from a-tags with the HTML injection vulnerability in CSV+. ## PoC ![scenario.png](files/scenario.png) ### Malicious csv file ```csv click me 👻 ``` `https://electronooooo.htmlbin.net/xsscalc.html` is a temporary link. ### Malicious html file (calc) ```html Hi :) ```