Wed, 04 Jul 2018 08:06:00 +0000
CST-7058 CSV injection in Forms, DDL and user export
The CSV files that are exported by Liferay Portal 7.0 CE GA7 (user export, DDL export and Form export) is susceptible to CSV injection if the CSV file is opened by a spreadsheet program (e.g., Microsoft Excel, LibreOffice Calc, Google Sheets).
Do no use a spreadsheet program to open CSV files.
See the Community Security Team process page for details on working with binary patches. The list below may contain multiple links. If there are multiple links, please check the notes section below for additional information. Please note that binary patches only apply to the release with which this issue is associated. Applying a binary patch to any other release will probably result in a broken install!
See the Community Security Team process page for details on working with source patches. Please note that source patches only apply to the release with which this issue is associated. Applying a source patch to any other release will probably result in a broken install!
For Github URLs suffixed with
.patch, removing this suffix will yield a graphical view of the patch.
This patch does not "solve" the CSV injection issue since the issue can only be fixed by the spreadsheet program (i.e., this is not a security vulnerability in Liferay Portal). With this patch, administrators will have the ability to disable CSV export for DDL and Form. Administrators can also present a warning about CSV injection to users before the CSV file is exported.
This issue can also be fixed by upgrading to Liferay Portal 7.1 CE GA1 or later.