Miggo Logo

CVE-2020-5299:
Potential CSV Injection vector in OctoberCMS

4

CVSS Score
3.1

Basic Information

EPSS Score
0.70471%
Published
6/3/2020
Updated
2/1/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
october/backendcomposer>= 1.0.319, < 1.0.4661.0.466

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from unescaped user-controlled data in CSV exports. The patches (c84bf03 & 802d8c8) explicitly add CsvEscapeFormula formatter to these two functions, which were previously missing this critical sanitization. Both functions handle core CSV export logic and were inserting raw user data prior to patching, making them the clear injection vectors.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t *ny us*rs wit* t** **ility to mo*i*y *ny **t* t**t *oul* *v*ntu*lly ** *xport** *s * *SV *il* *rom t** `Import*xport*ontroll*r` *oul* pot*nti*lly intro*u** * *SV inj**tion into t** **t* to **us* t** **n*r*t** *SV *xport *il* to ** m*li*iou

Reasoning

T** vuln*r**ility st*mm** *rom un*s**p** us*r-*ontroll** **t* in *SV *xports. T** p*t***s (******* & *******) *xpli*itly *** `*sv*s**p**ormul*` *orm*tt*r to t**s* two `*un*tions`, w*i** w*r* pr*viously missin* t*is *riti**l s*nitiz*tion. *ot* `*un*ti