Hygeia application version > 1.11.0, < 1.30.4 is vulnerable to CSV Injection, allowing malicious code execution. Learn about the impact, affected systems, exploitation, and mitigation steps.
Hygeia is an application for collecting and processing personal and case data in connection with communicable diseases. In affected versions, all CSV Exports contain a CSV Injection Vulnerability that allows malicious code execution.
Understanding CVE-2021-41128
What is CVE-2021-41128?
Hygeia application versions > 1.11.0, < 1.30.4 are affected by a CSV Injection Vulnerability due to lack of validation of formula fields in CSV Exports. An attacker can exploit this to introduce and execute malicious code.
The Impact of CVE-2021-41128
This vulnerability has a CVSS base score of 9.1 (Critical severity) with high confidentiality impact, low integrity impact, and low availability impact. It requires low privileges and no user interaction, affecting the product's scope.
Technical Details of CVE-2021-41128
Vulnerability Description
Users can submit formulas as exported fields, leading to code execution upon file ingestion without proper validation or sanitization, enabling attackers to craft malicious code.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates