Miggo Logo

GHSA-29w6-c52g-m8jc: C5 Firefly III CSV Injection.

4

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
CWE
-
Published
1/31/2024
Updated
1/31/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
grumpydictator/firefly-iiicomposer< 6.1.76.1.7

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The provided vulnerability information describes a CSV injection risk in Firefly III's export functionality, but does not include specific code references, commit diffs, or patching details. While the core issue likely resides in CSV data formatting functions that fail to properly sanitize user-controlled input (e.g., escaping formula-initiating characters like =, -, @), the advisory and description lack concrete evidence of specific function names or file paths. The absence of code context or patch information makes it impossible to identify vulnerable functions with high confidence. A proper analysis would require examining the CSV generation logic in versions <6.1.7 to locate missing input sanitization routines.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry *SV inj**tion is * vuln*r**ility w**r* untrust** us*r input in *SV *il*s **n l*** to un*ut*oriz** ****ss or **t* m*nipul*tion. In my su*s*qu*nt t*stin* o* t** *ppli**tion. ### **t*ils I *is*ov*r** t**t t**r* is *n option to "*xport **t*

Reasoning

T** provi*** vuln*r**ility in*orm*tion **s*ri**s * *SV inj**tion risk in *ir**ly III's *xport *un*tion*lity, *ut *o*s not in*lu** sp**i*i* *o** r***r*n**s, *ommit *i**s, or p*t**in* **t*ils. W*il* t** *or* issu* lik*ly r*si**s in *SV **t* *orm*ttin*