PHPSpreadsheet is a pure PHP library for reading and writing spreadsheet files. In affected versions `\PhpOffice\PhpSpreadsheet\Writer\Html` doesn't sanitize spreadsheet styling information such as font names, allowing an attacker to inject arbitrary JavaScript on the page. As a result an attacker may used a crafted spreadsheet to fully takeover a session of a user viewing spreadsheet files as HTML. This issue has been addressed in release version 2.1.0. All users are advised to upgrade. There are no known workarounds for this vulnerability.
References
| Link | Resource |
|---|---|
| https://github.com/PHPOffice/PhpSpreadsheet/commit/f7cf378faed2e11cf4825bf8bafea4922ae44667 | Patch |
| https://github.com/PHPOffice/PhpSpreadsheet/pull/3957 | Issue Tracking Patch |
| https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-wgmf-q9vr-vww6 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-08-28 21:15
Updated : 2024-09-04 17:32
NVD link : CVE-2024-45046
Mitre link : CVE-2024-45046
CVE.ORG link : CVE-2024-45046
JSON object : View
Products Affected
phpoffice
- phpspreadsheet
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
