Description
“Shuup” application in versions 0.4.2 to 2.10.8 is affected by the “Formula Injection” vulnerability. A customer can inject payloads in the name input field in the billing address while buying a product. When a store administrator accesses the reports page to export the data as an Excel file and opens it, the payload gets executed.
No analysis available yet.
Remediation
Vendor Solution
Update to 2.11.0
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-0241 | “Shuup” application in versions 0.4.2 to 2.10.8 is affected by the “Formula Injection” vulnerability. A customer can inject payloads in the name input field in the billing address while buying a product. When a store administrator accesses the reports page to export the data as an Excel file and opens it, the payload gets executed. |
Github GHSA |
GHSA-663j-rjcr-789f | CSV injection in shuup |
References
History
No history.
Status: PUBLISHED
Assigner: Mend
Published:
Updated: 2024-09-17T02:11:12.333Z
Reserved: 2021-01-22T00:00:00.000Z
Link: CVE-2021-25962
No data.
Status : Modified
Published: 2021-09-29T14:15:08.070
Modified: 2024-11-21T05:55:41.060
Link: CVE-2021-25962
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA