[Tracker-discuss] [issue580] CSV Injection Vulnerability

2017-10-05 Thread John Rouillard
John Rouillard added the comment: Hi all: If the generated csv line looks like: "-2+3+cmd|' /C calc'!A0","7","stalled","I cansee","","2017-10-05 22:15","0" with the quotes surrounding the injected data, will that prevent the injection? To generate the above I changed the calls to csv.write

[Tracker-discuss] [issue580] CSV Injection Vulnerability

2016-02-23 Thread R David Murray
R David Murray added the comment: This should be reported to Roundup upstream. The fix should be simple (just changing the csv dialect), so it doesn't really matter who develops the patch as long as both upstream and we apply it :) -- nosy: +r.david.murray status: unread -> chatting

[Tracker-discuss] [issue580] CSV Injection Vulnerability

2016-02-23 Thread Maciej Szulik
New submission from Maciej Szulik: Copied from http://bugs.python.org/issue26399: The "Download as CSV " feature of bugs.python.org does not properly "escape" fields. This allows an adversary to turn a field into active content so when we download the csv and opens it, the active content gets