Issue: CSV injection vulnerability
Security researcher: Richard Tan @ The Missing Link Security
Product name: Serv-U FTP Server
Product version: Tested on 15.1.7
Fixed in: Serv-U 15.1.7 Hotfix 2
The application allowed table entries to contain a string which could be
evaluated by Excel as a Dynamic Data Exchange (DDE) macro.
Privileged users who has the appropriate rights to modify or create users
could insert values into user properties which is evaluated as macros if the
user list is exported as an Excel format.
Steps to reproduce (Proof of concept):
1) Login as a user that has privileges to create or modify users.
2) Create a new user and add the following payload into the
"description" field. "=cmd|'/C calc.exe'!A0"
3) Export the user list with a file name "CSVinjection.csv" on the
4) On the application server, locate the file and execute it. Notice
that a warning sign could be prompted depending the Excel's security
settings. (If so click enable)
5) Observe that the calculator tool is executed. This is a proof of
concept however an adversary could exploit this weakness to potentially gain
access to the application server (or from where ever the file is executed