Oracle Siebel CRM 8.1.1 CSV Injection

2018.10.23
Credit: Sarath Nair
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Exploit Title: Oracle Siebel CRM 8.1.1 - CSV Injection # Date: 2018-10-21 # Exploit Author: Sarath Nair aka AceNeon13 # Contact: @AceNeon13 # Vendor Homepage: www.oracle.com # Software Link: http://www.oracle.com/us/products/applications/siebel/siebel-crm-8-1-1-066196.html # Version: Oracle Siebel CRM Version 8.1.1 and below # PoC Exploit: CSV Injection # Vulnerable URL: All CSV Export functionalities within the CRM application # Description: Siebel CRM application was found to be vulnerable to Excel Macro injection vulnerability, # in places where user input is allowed (in text form) and the input can then be exported in CSV # form. An attacker can change user information to include in his input a malicious excel function. =-2+3+cmd|' /C calc'!D # The function will then be executed on the victimas machine, # once the victim exports the details in CSV format and opens the exported file in Microsoft Excel. # Impact: The vulnerability doesnat target the web application but rather its users. # A hypothetical attacker could use it, in order to trick other application users into unwillingly # executing arbitrary malicious code, potentially leading to full a compromise of their workstation. # Although excel has implemented certain features to protect its users # (the user is asked whether he wants to execute a potentially harmful external script), # the user could easily assume that the content can be trusted since the file is # extracted from a trusted source. # Solution: Disable CSV export in all list applets and where CSV export is available. # https://docs.oracle.com/cd/E95904_01/books/Secur/siebel-security-hardening.html#c_Patch_Management_ai1029938a ######################################## # Vulnerability Disclosure Timeline: 2017-November-20: Discovered vulnerability 2017-November-23: Vendor Notification 2017-November-29: Vendor Response/Feedback 2018-October-04: Vendor Fix/Patch/Workaround 2018-October-21: Public Disclosure ######################################## Warm regards, Sarath Nair


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top