CVE-2023-31044

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker, who is already authenticated as a user, to inject harmful code into the Campaign Name field, which can then be exported to a CSV file. When this file is opened in spreadsheet software, it may automatically execute the malicious code, potentially leading to data theft or other harmful actions.

Technical Description

An issue was discovered in Nokia Impact before Mobile 23_FP1. In Impact DM 19.11 onwards, a remote authenticated user, using the Add Campaign functionality, can inject a malicious payload within the Campaign Name. This data can be exported to a CSV file. Attackers can populate data fields that may attempt data exfiltration or other malicious activity when automatically executed by the spreadsheet software.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References