Vulnerability Description
Tendenci 12.3.1 contains a CSV formula injection vulnerability in the contact form message field that allows attackers to inject malicious formulas during export. Attackers can submit crafted payloads like '=10+20+cmd|' /C calc'!A0' in the message field to trigger arbitrary command execution when the CSV is opened in spreadsheet applications.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tendenci | Tendenci | 12.3.1 |
Related Weaknesses (CWE)
References
- https://github.com/tendenci/tendenciProduct
- https://www.exploit-db.com/exploits/49145ExploitThird Party AdvisoryVDB Entry
- https://www.tendenci.com/Product
- https://www.vulncheck.com/advisories/tendenci-csv-formula-injectionThird Party Advisory
- https://www.exploit-db.com/exploits/49145ExploitThird Party AdvisoryVDB Entry
FAQ
What is CVE-2020-36962?
CVE-2020-36962 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Tendenci 12.3.1 contains a CSV formula injection vulnerability in the contact form message field that allows attackers to inject malicious formulas during export. Attackers can submit crafted payloads...
How severe is CVE-2020-36962?
CVE-2020-36962 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-36962?
Check the references section above for vendor advisories and patch information. Affected products include: Tendenci Tendenci.