Lucene search

K
nessusThis script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.SPREADSHEET_EXCEL_RCE_CVE-2023-7101.NASL
HistoryMay 17, 2024 - 12:00 a.m.

Spreadsheet::ParseExcel RCE (CVE-2023-7101)

2024-05-1700:00:00
This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
3
spreadsheet::parseexcel
rce vulnerability
cve-2023-7101
remote code execution
unvalidated input
excel parsing logic
nessus scanner

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.1 High

AI Score

Confidence

Low

0.053 Low

EPSS

Percentile

93.1%

According to its self-reported version number, the Spreadsheet::ParseExcel perl module is vulnerable to a remote code execution vulnerability due to passing unvalidated input from a file into a string-type “eval”. Specifically, the issue stems from the evaluation of Number format strings (not to be confused with printf-style format strings) within the Excel parsing logic.

Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(197297);
  script_version("1.1");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/05/19");

  script_cve_id("CVE-2023-7101");
  script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2024/01/23");

  script_name(english:"Spreadsheet::ParseExcel RCE (CVE-2023-7101)");

  script_set_attribute(attribute:"synopsis", value:
"The Perl module is vulnerable to an remote code execution vulnerability.");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version number, the Spreadsheet::ParseExcel perl module is vulnerable to a remote code 
execution vulnerability due to passing unvalidated input from a file into a string-type “eval”. Specifically, the issue 
stems from the evaluation of Number format strings (not to be confused with printf-style format strings) within the 
Excel parsing logic. 

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
  # https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?6b44b7b8");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Spreadsheet::ParseExcel version 0.66 or later.");
  script_set_attribute(attribute:"agent", value:"all");
  script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2023-7101");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2023/12/24");
  script_set_attribute(attribute:"patch_publication_date", value:"2023/12/29");
  script_set_attribute(attribute:"plugin_publication_date", value:"2024/05/17");

  script_set_attribute(attribute:"plugin_type", value:"combined");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:jmcnamara:spreadsheet%3a%3aparseexcel");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Misc.");

  script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("jmcnamara_spreadsheet_parseexcel_nix_installed.nbin", "jmcnamara_spreadsheet_parseexcel_win_installed.nbin");
  script_require_keys("installed_sw/John McNamara Spreadsheet-ParseExcel");

  exit(0);
}

include('vcf.inc');

var app_info = vcf::combined_get_app_info(app:'John McNamara Spreadsheet-ParseExcel');

var constraints = [{ 'fixed_version' : '0.66'}];

vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);
VendorProductVersionCPE
jmcnamaraspreadsheet%3a%3aparseexcelcpe:/a:jmcnamara:spreadsheet%3a%3aparseexcel

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.1 High

AI Score

Confidence

Low

0.053 Low

EPSS

Percentile

93.1%