All the vulnerabilites related to Douglas Wilson - Spreadsheet::ParseExcel
cve-2023-7101
Vulnerability from cvelistv5
Published
2023-12-24 21:34
Modified
2024-08-02 08:50
Severity ?
EPSS score ?
Summary
Spreadsheet::ParseExcel version 0.65 is a Perl module used for parsing Excel files. Spreadsheet::ParseExcel is vulnerable to an arbitrary code execution (ACE) vulnerability due to passing unvalidated input from a file into a string-type “eval”. Specifically, the issue stems from the evaluation of Number format strings (not to be confused with printf-style format strings) within the Excel parsing logic.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Douglas Wilson | Spreadsheet::ParseExcel |
Version: 0.65 |
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:jmcnamara:spreadsheet\\:\\:parseexcel:0.41:*:*:*:*:perl:*:*" ], "defaultStatus": "unknown", "product": "spreadsheet\\", "vendor": "jmcnamara", "versions": [ { "lessThanOrEqual": "0.65", "status": "affected", "version": "0.41", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:debian:debian_linux:10:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "debian_linux", "vendor": "debian", "versions": [ { "status": "affected", "version": "10" } ] }, { "cpes": [ "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fedora", "vendor": "fedoraproject", "versions": [ { "status": "affected", "version": "38" }, { "status": "affected", "version": "39" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-7101", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-01-04T16:25:54.193667Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2024-01-02", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-7101" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2024-06-25T17:30:10.314Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T08:50:08.227Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md" }, { "tags": [ "x_transferred" ], "url": "https://https://www.cve.org/CVERecord?id=CVE-2023-7101" }, { "tags": [ "x_transferred" ], "url": "https://https://metacpan.org/dist/Spreadsheet-ParseExcel" }, { "tags": [ "x_transferred" ], "url": "https://https://github.com/haile01/perl_spreadsheet_excel_rce_poc" }, { "tags": [ "x_transferred" ], "url": "https://github.com/jmcnamara/spreadsheet-parseexcel/blob/c7298592e102a375d43150cd002feed806557c15/lib/Spreadsheet/ParseExcel/Utility.pm#L171" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2023/12/29/4" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00025.html" }, { "tags": [ "x_transferred" ], "url": "https://https://github.com/jmcnamara/spreadsheet-parseexcel/commit/bd3159277e745468e2c553417b35d5d7dc7405bc" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFEHKULQRVXHIV7XXK2RGD4VQN6Y4CV5/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2FIWDHRYTAAQLGM6AFOZVM7AFZ4H2ZR/" }, { "tags": [ "x_transferred" ], "url": "https://security.metacpan.org/2024/02/10/vulnerable-spreadsheet-parsing-modules.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://metacpan.org/pod/Spreadsheet::ParseExcel", "defaultStatus": "affected", "packageName": "Spreadsheet::ParseExcel", "product": "Spreadsheet::ParseExcel", "repo": "https://metacpan.org/release/DOUGW/Spreadsheet-ParseExcel-0.65/source/lib/Spreadsheet", "vendor": "Douglas Wilson", "versions": [ { "status": "affected", "version": "0.65" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Le Dinh Hai (https://github.com/haile01/perl_spreadsheet_excel_rce_poc/tree/main) " }, { "lang": "en", "type": "reporter", "user": "00000000-0000-4000-9000-000000000000", "value": "Barracuda Networks Inc. https://www.barracuda.com/" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: transparent;\"\u003eSpreadsheet::ParseExcel version 0.65 is a Perl module used for parsing Excel files. Spreadsheet::ParseExcel is vulnerable to an arbitrary\u003c/span\u003e \u003cspan style=\"background-color: transparent;\"\u003ecode execution (ACE) vulnerability due to passing unvalidated input from a file into a string-type \u201ceval\u201d. Specifically, the issue stems from the evaluation of Number format strings (not to be confused with printf-style format strings) within the Excel parsing logic. \u003c/span\u003e\u003cbr\u003e" } ], "value": "Spreadsheet::ParseExcel version 0.65 is a Perl module used for parsing Excel files. Spreadsheet::ParseExcel is vulnerable to an arbitrary code execution (ACE) vulnerability due to passing unvalidated input from a file into a string-type \u201ceval\u201d. Specifically, the issue stems from the evaluation of Number format strings (not to be confused with printf-style format strings) within the Excel parsing logic. \n" } ], "impacts": [ { "capecId": "CAPEC-137", "descriptions": [ { "lang": "en", "value": "CAPEC-137: Parameter Injection" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-95", "description": "CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-03T16:54:52.650Z", "orgId": "027e81ed-0dd4-4685-ab4d-884aec5bb484", "shortName": "Mandiant" }, "references": [ { "url": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md" }, { "url": "https://https://www.cve.org/CVERecord?id=CVE-2023-7101" }, { "url": "https://https://metacpan.org/dist/Spreadsheet-ParseExcel" }, { "url": "https://https://github.com/haile01/perl_spreadsheet_excel_rce_poc" }, { "url": "https://github.com/jmcnamara/spreadsheet-parseexcel/blob/c7298592e102a375d43150cd002feed806557c15/lib/Spreadsheet/ParseExcel/Utility.pm#L171" }, { "url": "http://www.openwall.com/lists/oss-security/2023/12/29/4" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00025.html" }, { "url": "https://https://github.com/jmcnamara/spreadsheet-parseexcel/commit/bd3159277e745468e2c553417b35d5d7dc7405bc" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFEHKULQRVXHIV7XXK2RGD4VQN6Y4CV5/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2FIWDHRYTAAQLGM6AFOZVM7AFZ4H2ZR/" }, { "url": "https://security.metacpan.org/2024/02/10/vulnerable-spreadsheet-parsing-modules.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to version 0.66\u003cbr\u003e" } ], "value": "Update to version 0.66\n" } ], "source": { "discovery": "UNKNOWN" }, "title": "Arbitrary Code Execution (ACE) Vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "027e81ed-0dd4-4685-ab4d-884aec5bb484", "assignerShortName": "Mandiant", "cveId": "CVE-2023-7101", "datePublished": "2023-12-24T21:34:46.527Z", "dateReserved": "2023-12-24T16:23:02.000Z", "dateUpdated": "2024-08-02T08:50:08.227Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }