OpenVAS parser improvments #13214
Merged
OpenVAS parser improvments #13214
DryRunSecurity / General Security Analyzer
succeeded
Sep 21, 2025 in 58s
DryRun Security
Details
General Security Analyzer Findings: 1 detected
⚠️ CSV Injection dojo/tools/openvas/parser.py (click for details)
| Type | CSV Injection |
| Description | The OpenVASParserV2 processes CSV files and directly assigns column values to Finding model fields such as title, summary, impact, mitigation, and openvas_result without specific sanitization against spreadsheet formula injection. While cleanup_openvas_text removes newlines and escape_restructured_text wraps text in triple backticks for display within DefectDojo, these functions do not prevent malicious formulas (e.g., starting with '=', '+', '-', '@') from being interpreted as commands if the exported data is opened in a spreadsheet program. If a malicious CSV is imported and then its findings are exported, an attacker could craft inputs that, when opened in a spreadsheet, execute arbitrary commands or exfiltrate data. |
| Filename | dojo/tools/openvas/parser.py |
| CodeLink | django-DefectDojo/dojo/tools/openvas/parser.py Lines 20 to 40 in e913275 |
Loading