7.8

CVE-2020-9372

Exploit

Appointment Booking Calendar <= 1.3.34 - CSV Injection

The Appointment Booking Calendar plugin before 1.3.35 for WordPress allows user input (in fields such as Description or Name) in any booking form to be any formula, which then could be exported via the Bookings list tab in /wp-admin/admin.php?page=cpabc_appointments.php. The attacker could achieve remote code execution via CSV injection.
Mögliche Gegenmaßnahme
Appointment Booking Calendar: Update to version 1.3.35, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt Appointment Booking Calendar
Version [*, 1.3.35)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
CodepeopleAppointment Booking Calendar SwPlatformwordpress Version < 1.3.35
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 19.34% 0.951
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE-1236 Improper Neutralization of Formula Elements in a CSV File

The product saves user-provided information into a Comma-Separated Value (CSV) file, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as a command when the file is opened by a spreadsheet product.