{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T14:00:51.726","vulnerabilities":[{"cve":{"id":"CVE-2021-41128","sourceIdentifier":"security-advisories@github.com","published":"2021-10-06T18:15:11.067","lastModified":"2024-11-21T06:25:32.143","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Hygeia is an application for collecting and processing personal and case data in connection with communicable diseases. In affected versions all CSV Exports (Statistics & BAG MED) contain a CSV Injection Vulnerability. Users of the system are able to submit formula as exported fields which then get executed upon ingestion of the exported file. There is no validation or sanitization of these formula fields and so malicious may construct malicious code. This vulnerability has been resolved in version 1.30.4. There are no workarounds and all users are advised to upgrade their package."},{"lang":"es","value":"Hygeia es una aplicación para recoger y procesar datos personales y de casos en relación con las enfermedades transmisibles. En las versiones afectadas, todas las exportaciones CSV (Statistics &amp; BAG MED) contienen una vulnerabilidad de inyección CSV. Los usuarios del sistema pueden enviar fórmulas como campos exportados que luego se ejecutan al ingerir el archivo exportado. No se presenta comprobación ni saneo de estos campos de fórmulas, por lo que maliciosos pueden construir código malicioso. Esta vulnerabilidad ha sido resuelta en la versión 1.30.4. No se presentan soluciones y se recomienda a todos los usuarios que actualicen su paquete"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":3.1,"impactScore":5.3},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-74"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hygeia_project:hygeia:*:*:*:*:*:*:*:*","versionStartIncluding":"1.11.0","versionEndExcluding":"1.30.4","matchCriteriaId":"F7DDCC54-C4E6-4E39-8F2B-AE90486E8AC1"}]}]}],"references":[{"url":"https://github.com/beatrichartz/csv/issues/103","source":"security-advisories@github.com","tags":["Issue Tracking","Third Party Advisory"]},{"url":"https://github.com/beatrichartz/csv/pull/104","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/jshmrtn/hygeia/commit/d917f27432fe84e1c9751222ae55bae36a4dce60","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/jshmrtn/hygeia/security/advisories/GHSA-8pwv-jhj2-2369","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://owasp.org/www-community/attacks/CSV_Injection","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/beatrichartz/csv/issues/103","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Issue Tracking","Third Party Advisory"]},{"url":"https://github.com/beatrichartz/csv/pull/104","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://github.com/jshmrtn/hygeia/commit/d917f27432fe84e1c9751222ae55bae36a4dce60","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/jshmrtn/hygeia/security/advisories/GHSA-8pwv-jhj2-2369","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://owasp.org/www-community/attacks/CSV_Injection","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}