We have had an issue raised in a penetration test which proved that there was a CSV Injection attack possible on the CSV import / export functionality of this Add-On.
How to Reproduce:
- Import redirects using a CSV which contains a CSV injection attack within one of the URL fields.
- Export redirects into a CSV file
- Open the CSV file in excel
The penetration tester was able to use CSV injection to push a powershell command into the database, when the CSV was then exported and opened in excel, the powershell script executed to download a file to the system.
This can be fixed by adding a simple URL validation for the Old and New URL fields and rejecting the CSV if any of the entries are invalid.