Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| PHPOffice | PhpSpreadsheet | >= 2.2.0, < 2.3.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | The PHPSpreadsheet library used by the plugin is affected by an XXE as the security scanner that prevents XXE attacks in the XLSX reader can be bypassed by slightly modifying the XML structure, utilizing white spaces. On servers that allow users to upload their own Excel (XLSX) sheets, Server files, and sensitive information can be disclosed by providing a crafted sheet. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-45293.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2024-45290 | 7.7 HIGH | Path traversal and Server-Side Request Forgery when opening XLSX files in PHPSpreadsheet |
| CVE-2024-45060 | 7.1 HIGH | Unauthenticated Cross-Site-Scripting (XSS) in sample file in PHPSpreadsheet |
| CVE-2024-45291 | 6.3 MEDIUM | Path traversal and Server-Side Request Forgery in HTML writer when embedding images is ena |
| CVE-2024-45292 | 5.4 MEDIUM | PhpSpreadsheet HTML writer is vulnerable to Cross-Site Scripting via JavaScript hyperlinks |
Plunge into the massive universe of EVE Online. Start your journey today. Explore alongside hundreds of thousands of explorers worldwide. <a href=https://www.eveonline.com/signup?invc=46758c20-63e3-4816-aa0e-f91cff26ade4>Join now</a>