Miggo Logo

CVE-2018-8092: CSV Injection vulnerability with exported contact lists in Mautic

9.8

CVSS Score
3.0

Basic Information

EPSS Score
0.65538%
Published
1/19/2021
Updated
1/9/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
mautic/corecomposer< 2.13.02.13.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper neutralization of formula elements in exported CSVs. The commit cbc49f0 shows the patch adds sanitization logic specifically in CommonController.php's exportResultsAs method when handling CSV output. The pre-patch version did not check for formula-initiating characters in cell data, making this function the injection vector. The direct correlation between the vulnerability description and the patched code confirms this function's role.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t M*uti* v*rsions ***or* *.**.* *** * vuln*r**ility t**t *llow** * *SV inj**tion wit* *xport** *ont**t lists - *ttps://www.ow*sp.or*/in**x.p*p/*SV_Inj**tion. ### P*t***s Up**t* to *.**.* or l*t*r. ### Work*roun*s Non*. ### *or mor* in*orm

Reasoning

T** vuln*r**ility st*ms *rom improp*r n*utr*liz*tion o* *ormul* *l*m*nts in *xport** *SVs. T** *ommit ******* s*ows t** p*t** ***s s*nitiz*tion lo*i* sp**i*i**lly in `*ommon*ontroll*r.p*p`'s `*xportR*sults*s` m*t*o* w**n **n*lin* *SV output. T** pr*-