CVE-2020-25445

7.8 HIGH

📋 TL;DR

This CSV formula injection vulnerability in Booking Core 1.7.0 allows attackers to embed malicious Excel formulas in subscription data. When administrators download and open the CSV file, the formulas execute, potentially compromising their systems. Only systems using the vulnerable version with the Subscribe feature enabled are affected.

💻 Affected Systems

Products:
  • Ultimate Booking System Booking Core
Versions: 1.7.0
Operating Systems: Any OS running the web application
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Subscribe feature to be enabled and used. Vulnerability exists in web application layer, not OS-specific.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator's computer gets fully compromised through Excel macro execution leading to ransomware, data theft, or lateral movement into corporate network.

🟠

Likely Case

Local file execution on administrator's machine, data exfiltration, or credential theft via Excel's formula capabilities.

🟢

If Mitigated

No impact if CSV files are opened in text editors or with Excel security settings that disable formula execution.

🌐 Internet-Facing: MEDIUM - Attack requires user interaction (admin opening CSV) but exploit can be delivered via web interface.
🏢 Internal Only: LOW - Requires authenticated user access to submit malicious subscription data.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires ability to submit subscription data (may require some level of access) and relies on admin downloading/opening CSV. CSV injection techniques are well-documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Implement input sanitization to escape CSV formula characters (=, +, -, @) or upgrade to newer version if available.

🔧 Temporary Workarounds

Input Sanitization

all

Escape CSV formula characters in Subscribe feature input handling

Implement server-side validation to escape =, +, -, @ characters with single quote prefix

Excel Security Configuration

windows

Configure Excel to disable automatic formula execution when opening CSV files

Excel Options > Trust Center > Trust Center Settings > External Content > Disable automatic update of links

🧯 If You Can't Patch

  • Disable Subscribe feature entirely if not required
  • Train administrators to open CSV files in text editors or with Excel's 'Open as Text' option

🔍 How to Verify

Check if Vulnerable:

Test Subscribe feature by submitting data containing Excel formulas like =cmd|' /C calc'!A0 and check if they appear unescaped in downloaded CSV

Check Version:

Check application version in admin panel or source code

Verify Fix Applied:

Verify that formula characters are properly escaped with single quotes in CSV output (e.g., '=cmd...)

📡 Detection & Monitoring

Log Indicators:

  • Unusual subscription entries containing formula characters
  • Multiple subscription attempts with similar payloads

Network Indicators:

  • CSV downloads containing formula patterns in HTTP responses

SIEM Query:

web_logs WHERE url_path LIKE '%subscribe%' AND (request_body CONTAINS '=' OR request_body CONTAINS '+' OR request_body CONTAINS '-')

🔗 References

📤 Share & Export