An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS02MzRwLTkzaDktOTJ2aM4AAu2Z

ghas-to-csv vulnerable to Improper Neutralization of Formula Elements in a CSV File


This GitHub Action creates a CSV file without sanitizing the output of the APIs. If an alert is dismissed or any other custom field contains executable code / formulas, it might be run when an endpoint opens that CSV file in a spreadsheet program. The data flow looks like this 👇🏻

graph TD
    A(Repository) -->|developer dismissal, other data input| B(GitHub Advanced Security data)
    B -->|ghas-to-csv| C(CSV file)
    C -->|spreadsheet program| D(endpoint executes potentially malicious code)


Please use version v1 or later. That tag moves from using csv to defusedcsv to mitigate this problem.


There is no workaround. Please upgrade to using the latest tag, v1 (or later).


For more information

If you have any questions or comments about this advisory:

Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: over 1 year ago

CVSS Score: 5.8
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L

Identifiers: GHSA-634p-93h9-92vh, CVE-2022-39217
References: Repository:
Blast Radius: 1.0

Affected Packages

Affected Version Ranges: < 1
Fixed in: 1