CVE-2017-1000039

9.8 CRITICAL

📋 TL;DR

CVE-2017-1000039 is a formula injection vulnerability in Framadate's CSV export feature that allows attackers to inject malicious formulas into exported spreadsheets. When victims open these CSV files in spreadsheet applications like Excel, the formulas can execute, potentially leading to information disclosure or remote code execution. This affects all users of Framadate version 1.0 who export poll results.

💻 Affected Systems

Products:
  • Framadate
Versions: Version 1.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the CSV export functionality which is a core feature of the application.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution on victim's machine when they open a malicious CSV file in a vulnerable spreadsheet application, potentially leading to full system compromise.

🟠

Likely Case

Information disclosure through formula execution that can access local files or system information from the victim's machine.

🟢

If Mitigated

Limited impact if users open CSV files in text editors instead of spreadsheet applications, or if spreadsheet applications have security features enabled.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires social engineering to get victims to open malicious CSV files in vulnerable spreadsheet applications.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.0

Vendor Advisory: https://framagit.org/framasoft/framadate/issues/220

Restart Required: No

Instructions:

1. Upgrade Framadate to version 1.1 or later. 2. Apply the patch that sanitizes CSV export output. 3. Verify the fix by testing CSV export functionality.

🔧 Temporary Workarounds

Disable CSV Export

all

Temporarily disable CSV export functionality in Framadate configuration

Edit Framadate configuration to remove CSV export options

User Education

all

Educate users to open CSV files in text editors only, not spreadsheet applications

🧯 If You Can't Patch

  • Implement strict input validation on all poll data submissions
  • Use web application firewall rules to block suspicious CSV export requests

🔍 How to Verify

Check if Vulnerable:

Test CSV export functionality by creating a poll with formula injection payloads like =HYPERLINK() or =WEBSERVICE() and checking if they appear unsanitized in exported CSV.

Check Version:

Check Framadate version in admin panel or configuration files

Verify Fix Applied:

After patching, repeat the vulnerability test and confirm that formulas are properly escaped or removed from CSV output.

📡 Detection & Monitoring

Log Indicators:

  • Unusual CSV export requests
  • Large number of CSV downloads from single IP

Network Indicators:

  • CSV files with formula patterns in HTTP responses

SIEM Query:

source="framadate_logs" AND (event="csv_export" OR url_path="*export*csv*")

🔗 References

📤 Share & Export