Preventing CSV Injection Attacks With A Browser Extension
CSV injection occurs when an attacker injects malicious code into a CSV file, and this code is executed when the file is opened in a spreadsheet program. This type of attack is possible because most spreadsheet programs have a set of built-in functions that run automatically when a CSV file is opene...
Main Author: | |
---|---|
Other Authors: | |
Format: | Thesis |
Published: |
Massachusetts Institute of Technology
2024
|
Online Access: | https://hdl.handle.net/1721.1/153858 |
_version_ | 1811091904021921792 |
---|---|
author | Dedhia, Ray |
author2 | Williams, John R. |
author_facet | Williams, John R. Dedhia, Ray |
author_sort | Dedhia, Ray |
collection | MIT |
description | CSV injection occurs when an attacker injects malicious code into a CSV file, and this code is executed when the file is opened in a spreadsheet program. This type of attack is possible because most spreadsheet programs have a set of built-in functions that run automatically when a CSV file is opened with the spreadsheet program. Given the widespread usage of CSV files and programs that interpret those CSV files, the risk posed by such CSV injection attacks is great.
In this study, I present a browser extension designed to sanitize all downloaded CSV f iles by eliminating any harmful code while preserving the integrity of benign code. The extension does this by first finding all formulas within a CSV file, and determining whether or not each one has the potential to contain malicious code. If the extension determines that a formula may be malicious, it will edit the cell containing that formula so that spreadsheet programs will interpret the cell as text, and will not execute it. |
first_indexed | 2024-09-23T15:09:51Z |
format | Thesis |
id | mit-1721.1/153858 |
institution | Massachusetts Institute of Technology |
last_indexed | 2024-09-23T15:09:51Z |
publishDate | 2024 |
publisher | Massachusetts Institute of Technology |
record_format | dspace |
spelling | mit-1721.1/1538582024-03-22T03:13:55Z Preventing CSV Injection Attacks With A Browser Extension Dedhia, Ray Williams, John R. Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science CSV injection occurs when an attacker injects malicious code into a CSV file, and this code is executed when the file is opened in a spreadsheet program. This type of attack is possible because most spreadsheet programs have a set of built-in functions that run automatically when a CSV file is opened with the spreadsheet program. Given the widespread usage of CSV files and programs that interpret those CSV files, the risk posed by such CSV injection attacks is great. In this study, I present a browser extension designed to sanitize all downloaded CSV f iles by eliminating any harmful code while preserving the integrity of benign code. The extension does this by first finding all formulas within a CSV file, and determining whether or not each one has the potential to contain malicious code. If the extension determines that a formula may be malicious, it will edit the cell containing that formula so that spreadsheet programs will interpret the cell as text, and will not execute it. M.Eng. 2024-03-21T19:11:07Z 2024-03-21T19:11:07Z 2024-02 2024-03-04T16:38:07.309Z Thesis https://hdl.handle.net/1721.1/153858 In Copyright - Educational Use Permitted Copyright retained by author(s) https://rightsstatements.org/page/InC-EDU/1.0/ application/pdf Massachusetts Institute of Technology |
spellingShingle | Dedhia, Ray Preventing CSV Injection Attacks With A Browser Extension |
title | Preventing CSV Injection Attacks With A Browser Extension |
title_full | Preventing CSV Injection Attacks With A Browser Extension |
title_fullStr | Preventing CSV Injection Attacks With A Browser Extension |
title_full_unstemmed | Preventing CSV Injection Attacks With A Browser Extension |
title_short | Preventing CSV Injection Attacks With A Browser Extension |
title_sort | preventing csv injection attacks with a browser extension |
url | https://hdl.handle.net/1721.1/153858 |
work_keys_str_mv | AT dedhiaray preventingcsvinjectionattackswithabrowserextension |