CVE-2023-31295
📋 TL;DR
A CSV injection vulnerability in Sesami Cash Point & Transport Optimizer (CPTO) version 6.3.8.6 allows remote attackers to extract sensitive information via the User Profile field. This affects organizations using the vulnerable CPTO software for cash management and transport optimization. Attackers can potentially access confidential data through crafted CSV exports.
💻 Affected Systems
- Sesami Cash Point & Transport Optimizer (CPTO)
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete exposure of sensitive user data, financial information, and system credentials leading to data breaches, financial fraud, and system compromise.
Likely Case
Extraction of user profile information including names, contact details, and potentially authentication data through malicious CSV file generation.
If Mitigated
Limited data exposure with proper input validation and output encoding preventing successful exploitation.
🎯 Exploit Status
Exploitation requires authenticated access to generate CSV exports but uses simple CSV injection techniques that are well-documented.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 6.3.8.7 or later
Vendor Advisory: https://herolab.usd.de/en/security-advisories/usd-2022-0053/
Restart Required: Yes
Instructions:
1. Contact Sesami support for updated version. 2. Backup current configuration. 3. Install version 6.3.8.7 or later. 4. Restart CPTO services. 5. Verify functionality.
🔧 Temporary Workarounds
Disable CSV Export Functionality
windowsTemporarily disable CSV export features for user profiles to prevent exploitation.
Modify CPTO configuration to remove CSV export permissions
Input Validation Filter
allImplement server-side validation to sanitize CSV output from user profile fields.
Add input sanitization for CSV special characters (=, +, -, @, |)
🧯 If You Can't Patch
- Implement strict access controls limiting CSV export capabilities to trusted administrators only.
- Monitor and audit all CSV export activities for suspicious patterns or unusual data extraction.
🔍 How to Verify
Check if Vulnerable:
Check CPTO version in application settings or about dialog - if version is exactly 6.3.8.6 (#718), system is vulnerable.
Check Version:
Check CPTO application menu → Help → About or examine installed programs in Windows Control Panel.
Verify Fix Applied:
Verify installed version is 6.3.8.7 or later and test CSV export functionality with malicious payloads in user profile fields.
📡 Detection & Monitoring
Log Indicators:
- Unusual CSV export activities
- Multiple large CSV exports in short time
- Export requests with special characters in user fields
Network Indicators:
- Unexpected CSV file downloads from CPTO server
- CSV files with formula injection patterns
SIEM Query:
source="cpto_logs" AND (event="csv_export" OR file_type="csv") AND (user_field CONTAINS "=" OR user_field CONTAINS "+" OR user_field CONTAINS "@")