Pycel through 1.0b30, when operating on an untrusted spreadsheet, allows code execution via a crafted formula in a cell, such as one beginning with the =IF(A1=200, eval("__import__('os').system( substring.
References
| Link | Resource |
|---|---|
| https://gist.github.com/aelmosalamy/cb098e61939718d2bb248fd1cc94f287 | Exploit Third Party Advisory |
| https://github.com/dgorissen/pycel | Product |
| https://github.com/stephenrauch/pycel | Product |
| https://pypi.org/project/pycel/ | Product |
| https://gist.github.com/aelmosalamy/cb098e61939718d2bb248fd1cc94f287 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-04-17 18:15
Updated : 2025-07-11 16:40
NVD link : CVE-2024-53924
Mitre link : CVE-2024-53924
CVE.ORG link : CVE-2024-53924
JSON object : View
Products Affected
dgorissen
- pycel
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
