GRANDING UTime Master - CSV Injection

  Hi All,

I was able to identify CSV Injection Vulnerability in one online attendance system i.e. GRANDING UTime Master (v UTime Master_9.0.7-Build:Apr 4,2023). 

UTime Master is a powerful web-based time and attendance management software that provides a stable connection to GRANDING’s standalone push communication devices by Ethernet/Wi-Fi/GPRS/3G and working as a private cloud to offer employee self-service by mobile application and web browser.

  1. Login to UTime Master using admin account
  2. Click on Personnel > Employee Management >Employee
  3. Select Any employee or create a new employee
  4. In First name Section embed you payload. For test case I used " =cmd|' /C notepad'!'A1' "
CSV payload embed in EMP NAME field.


Once submitted, the CSV payload will be visible in First Name Field. Click on export button and click on CSV Export.
CSV payload embedded in EMP NAME field.

Open the exported file and payload will be executed successfully.


I have also observed multiple other fields are also vulnerable to CSV injection e.g. Device Name, Department etc.

XSS has been fixed in latest versions after 9.0.7-Build:Apr 4,2023

Comments

Popular posts from this blog

GRANDING UTime Master - IDOR (CVE-2023-45393)

GRANDING UTime Master - Stored XSS (CVE-2023-45391)

Ericsson BSCS iX R18 Billing & Rating (ADMX, MX) - Stored XSS (CVE-2020-29144, CVE-2020-29145)