Release 79 Security Advisory

Netskope Admin UI CSV Injection


Security Advisory ID: NSKPSA2020-002

Version: 1.0

Status: Published

Last Modified: October 19th, 2020


Who should read this documentTechnical and Security Personnel
Impact of VulnerabilityPrivilege Escalation
CVE NumberCVE-2020-28845
Severity RatingHigh
Overall CVSS ScoreCVSS 7.3
RecommendationsVerification of update to the latest release of the Netskope Admin UI.
Security Advisory ReplacementNone
Affected SoftwareNetskope Admin UI Software Version before 79.0.0
Updated Software VersionNetskope Admin UI Software Version 79
Special Notes and AcknowledgementsThe Etisalat - Red Team
CWE ReferenceCWE-1236: Improper Neutralization of Formula Elements in a CSV File


This update resolves an issue within the Netskope Admin UI where an unauthenticated user can inject malicious payload in Admin UI that can compromise Admin’s machine when a CSV report is downloaded.


This Release/patch remediates the following issues: CVE-2020-nnnn


Affected Components
Netskope Admin UI – Downloading Audit log report.


All of these issues are resolved in Netskope Admin UI version R79 released on October 12th- 14th.


This vulnerability was triaged, validated, and fixed by Netskope. Customers are automatically upgraded Netskope Admin UI to Release 79.




Special Notes and Acknowledgement
Netskope credits Aamir Rehman from Etisalat Red Team for reporting this flaw.


This security Advisory was written by the Product Security Incident Response Team, Netskope, Inc.




Do we use this for communication when a customer is abusing our systems?
No, please reach out to [email protected] for support on this.


What is affected by this security vulnerability?
Netskope Web Interface used by customers to manage their tenant(s).


Do I need to Update Immediately?
No action required by our customers. This is an acknowledgment of the vulnerability and CVE.


Affected Versions
Any Netskope Admin UI Software Versions prior to R79.


Protected Versions


What issues does this release and/or patch address?
The release includes the fix for the reported issue as well as other items which can be found at: Netskope Support Release Notes


How do I know if my Netskope WebUI is vulnerable or not?
The product and version can be found by visiting the Netskope Admin UI Dashboard, click Settings, check the Software Version.


What has Netskope done to resolve the issue?
Netskope has fixed the issue in Release 79 to address this security flaw. Customer environments are automatically patched as part of our release process.


Where do I download the fix?


How does Netskope respond to this and any other security flaws?
Netskope has a private bug bounty program as well as the following public guidance for reporting concerns and issues from the research community which can be found at: Vulnerability Disclosure Policy.


Netskope follows a documented triage, remediation, and testing process for any reported items.


How do I find out about security vulnerabilities with your products?
Please visit the security advisory section of our support page at: Security Advisories.


How was this found?
This was found and reported to Netskope from Aamir Rehman – Etisalat Red Team via Netskope’s published vulnerability disclosure process.