Vulnerabilities:
https://nvd.nist.gov/vuln/detail/CVE-2020-13247
https://nvd.nist.gov/vuln/detail/CVE-2020-13248
The vulnerability exists in the export feature and allows a remote user to inject arbitrary code into CSV files.
CSV Injection, aka Excel Macro Injection or Formula Injection (CVE-2020-13247)
"Any user can modify his / her name and replace it with a malicious macro. For example" John Smith "becomes" = cmd | ’/ C calc’! A1 Smith ""
Previously, it was possible to go to the account section and put a command instead of the name. When the administrator went to the dashboard and exported the audit containing the user data, a csv was created, which, if opened with excel, could run the macro written by the user and could potentially be harmful to the pc of the administrator.
The fix was conducted in two places:
The Web Application is affected by a Stored XSS Vulnerability
Stored XSS Vulnerability (CVE-2020-13248)
"whenever a user uploads an image that is not base64 encoded, the system considers it valid and copies it internally"
Any user can upload their own Profile Image under the My Account section, which is sent to the server as a base64 encoded sequence and embedded elsewhere.
The Web Application is affected by a Stored XSS Vulnerability. If an attacker manages other users to request the Stored XSS parameter, they can execute arbitrary JavaScript code within the user’s browser in the context of that user’s session.
The fix was conducted in two places