CVE-2023-7101
CVE Published | 2023-12-24 |
---|---|
Related CWE(s) | CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection'), CWE-94: Improper Control of Generation of Code ('Code Injection') |
Related Vendor(s) | jmcnamara, fedoraproject, debian |
Related Product(s) | fedora, spreadsheet\, debian_linux |
Exploitation Reported (CISA KEV) | 2024-01-02 |
CVSS 3 Base Score | 7.8 (HIGH) |
CVSS 3 Attack Complexity | LOW |
CVSS 3 Attack Vector | LOCAL |
Spreadsheet::ParseExcel version 0.65 is a Perl module used for parsing Excel files. Spreadsheet::ParseExcel is vulnerable to an arbitrary code execution (ACE) vulnerability due to passing unvalidated input from a file into a string-type “eval”. Specifically, the issue stems from the evaluation of Number format strings (not to be confused with printf-style format strings) within the Excel parsing logic.
Cyber Threat Graph Context
Explore how this CVE relates to the wider threat graph