This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Knock Subdomain Scan v4.1.1 suffers from **CSV Injection** due to unfiltered server headers.β¦
π― **Affected**: **Knock Subdomain Scan** version **4.1.1**. Developed by **Gianni Amato** (guelfoweb). Specifically targets users running this exact version of the domain scanning tool.
Q4What can hackers do? (Privileges/Data)
π **Attacker Capabilities**: Can execute arbitrary commands via **CSV formula injection** (e.g., `=cmd|' /C calc'!A1`).β¦
π£ **Public Exploit**: **YES**. ExploitDB ID **49342** exists. VulnCheck advisory confirms the vulnerability. Wild exploitation is possible if victims download and open the generated CSV reports.
Q7How to self-check? (Features/Scanning)
π **Self-Check**: 1. Check version: `knock --version`. 2. Look for **v4.1.1**. 3. Inspect generated CSV files for unexpected formula prefixes (`=`, `+`, `-`, `@`). 4. Scan for unfiltered header data in output logs.
π§ **No Patch Workaround**: 1. **Do NOT open** generated CSV files directly in Excel/Sheets. 2. Use **Notepad** or **VS Code** to view results. 3.β¦