Created
January 23, 2025 11:27
-
-
Save 6en6ar/5d39374d6ced8acbe489e0b1b932d056 to your computer and use it in GitHub Desktop.
Public disclosure for a security issue inside KW Hotel desktop application
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Product: https://kwhotel.com/download/kwhotel-free/ | |
Version: v0.47 | |
Vulnerability type: CSV injection | |
CVE ID: CVE-2023-46400 | |
Description: CSV Formula Injection inside KWHotel Free edition through version 0.47 inside add guest functionality. | |
When adding a guest a payload in form of a csv injection can be embedded inside the comment field of the guest. | |
The input is not validated and can be exported to a csv file resulting in a csv formula injection. Payload used: | |
@SUM(44+44)*cmd|' /C powershell'!A0 | |
------------------------------------------------------------------- | |
Product: https://kwhotel.com/download/kwhotel-free/ | |
Version: v0.47 | |
Vulnerability type: CSV injection | |
CVE ID: CVE-2023-46401 | |
Description: CSV Formula Injection inside KWHotel Free edition through version 0.47 inside add invoice functionality. | |
When adding an invoice inside the Accounting tab of the application the field for searching customers, the attacker can embed a payload instead because the input is not validated. | |
Payload used: | |
=SUM(44+44)*cmd|' /C powershell'!A0 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment