Share
## https://sploitus.com/exploit?id=PACKETSTORM:155673
Issue: CSV injection vulnerability  
  
CVE: CVE-2019-13181  
  
Security researcher: Richard Tan @ The Missing Link Security  
  
Product name: Serv-U FTP Server  
  
Product version: Tested on 15.1.7  
  
Fixed in: Serv-U 15.1.7 Hotfix 2  
  
  
  
  
  
# Overview  
  
The application allowed table entries to contain a string which could be  
evaluated by Excel as a Dynamic Data Exchange (DDE) macro.  
  
Privileged users who has the appropriate rights to modify or create users  
could insert values into user properties which is evaluated as macros if the  
user list is exported as an Excel format.  
  
  
  
Steps to reproduce (Proof of concept):  
  
1) Login as a user that has privileges to create or modify users.  
  
2) Create a new user and add the following payload into the  
"description" field. "=cmd|'/C calc.exe'!A0"  
  
3) Export the user list with a file name "CSVinjection.csv" on the  
application server.  
  
4) On the application server, locate the file and execute it. Notice  
that a warning sign could be prompted depending the Excel's security  
settings. (If so click enable)  
  
5) Observe that the calculator tool is executed. This is a proof of  
concept however an adversary could exploit this weakness to potentially gain  
access to the application server (or from where ever the file is executed  
from).