CVE-2023-7101

Spreadsheet::ParseExcel version 0.65 is a Perl module used for parsing Excel files. Spreadsheet::ParseExcel is vulnerable to an arbitrary code execution (ACE) vulnerability due to passing unvalidated input from a file into a string-type “eval”. Specifically, the issue stems from the evaluation of Number format strings (not to be confused with printf-style format strings) within the Excel parsing logic.
References
Link Resource
http://www.openwall.com/lists/oss-security/2023/12/29/4 Mailing List Patch Third Party Advisory
https://github.com/jmcnamara/spreadsheet-parseexcel/blob/c7298592e102a375d43150cd002feed806557c15/lib/Spreadsheet/ParseExcel/Utility.pm#L171 Product
https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md Third Party Advisory
https://https://github.com/haile01/perl_spreadsheet_excel_rce_poc Broken Link Third Party Advisory
https://https://github.com/jmcnamara/spreadsheet-parseexcel/commit/bd3159277e745468e2c553417b35d5d7dc7405bc Broken Link Patch
https://https://metacpan.org/dist/Spreadsheet-ParseExcel Broken Link Product
https://https://www.cve.org/CVERecord?id=CVE-2023-7101 Broken Link Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/12/msg00025.html Mailing List
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFEHKULQRVXHIV7XXK2RGD4VQN6Y4CV5/ Mailing List
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2FIWDHRYTAAQLGM6AFOZVM7AFZ4H2ZR/ Mailing List
https://security.metacpan.org/2024/02/10/vulnerable-spreadsheet-parsing-modules.html Third Party Advisory
http://www.openwall.com/lists/oss-security/2023/12/29/4 Mailing List Patch Third Party Advisory
https://github.com/jmcnamara/spreadsheet-parseexcel/blob/c7298592e102a375d43150cd002feed806557c15/lib/Spreadsheet/ParseExcel/Utility.pm#L171 Product
https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2023/MNDT-2023-0019.md Third Party Advisory
https://https://github.com/haile01/perl_spreadsheet_excel_rce_poc Broken Link Third Party Advisory
https://https://github.com/jmcnamara/spreadsheet-parseexcel/commit/bd3159277e745468e2c553417b35d5d7dc7405bc Broken Link Patch
https://https://metacpan.org/dist/Spreadsheet-ParseExcel Broken Link Product
https://https://www.cve.org/CVERecord?id=CVE-2023-7101 Broken Link Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/12/msg00025.html Mailing List
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFEHKULQRVXHIV7XXK2RGD4VQN6Y4CV5/ Mailing List
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M2FIWDHRYTAAQLGM6AFOZVM7AFZ4H2ZR/ Mailing List
https://security.metacpan.org/2024/02/10/vulnerable-spreadsheet-parsing-modules.html Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:jmcnamara:spreadsheet\:\:parseexcel:*:*:*:*:*:perl:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

History

13 Feb 2025, 18:16

Type Values Removed Values Added
Summary (en) Spreadsheet::ParseExcel version 0.65 is a Perl module used for parsing Excel files. Spreadsheet::ParseExcel is vulnerable to an arbitrary code execution (ACE) vulnerability due to passing unvalidated input from a file into a string-type “eval”. Specifically, the issue stems from the evaluation of Number format strings (not to be confused with printf-style format strings) within the Excel parsing logic. (en) Spreadsheet::ParseExcel version 0.65 is a Perl module used for parsing Excel files. Spreadsheet::ParseExcel is vulnerable to an arbitrary code execution (ACE) vulnerability due to passing unvalidated input from a file into a string-type “eval”. Specifically, the issue stems from the evaluation of Number format strings (not to be confused with printf-style format strings) within the Excel parsing logic.

27 Jan 2025, 21:53

Type Values Removed Values Added
References () https://lists.debian.org/debian-lts-announce/2023/12/msg00025.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2023/12/msg00025.html - Mailing List

Information

Published : 2023-12-24 22:15

Updated : 2025-02-13 18:16


NVD link : CVE-2023-7101

Mitre link : CVE-2023-7101

CVE.ORG link : CVE-2023-7101


JSON object : View

Products Affected

jmcnamara

  • spreadsheet\

debian

  • debian_linux

fedoraproject

  • fedora
CWE
CWE-95

Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')

CWE-94

Improper Control of Generation of Code ('Code Injection')