![](/assets/img/cve_300x82_sin_bg.png)
CVE-2022-44019
https://notcve.org/view.php?id=CVE-2022-44019
29 Oct 2022 — In Total.js 4 before 0e5ace7, /api/common/ping can achieve remote command execution via shell metacharacters in the host parameter. En Total.js 4 anterior a 0e5ace7, /api/common/ping puede lograr la ejecución remota de comandos a través de metacaracteres de shell en el parámetro host. • https://github.com/totaljs/code/issues/12 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-32831 – Code injection in total.js
https://notcve.org/view.php?id=CVE-2021-32831
30 Aug 2021 — Total.js framework (npm package total.js) is a framework for Node.js platfrom written in pure JavaScript similar to PHP's Laravel or Python's Django or ASP.NET MVC. In total.js framework before version 3.4.9, calling the utils.set function with user-controlled values leads to code-injection. This can cause a variety of impacts that include arbitrary code execution. This is fixed in version 3.4.9. Total.js framework (paquete npm total.js) es un framework para la plataforma Node.js escrito en JavaScript puro ... • https://github.com/totaljs/framework/blob/e644167d5378afdc45cb0156190349b2c07ef235/changes.txt#L11 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-23389 – Arbitrary Code Execution
https://notcve.org/view.php?id=CVE-2021-23389
12 Jul 2021 — The package total.js before 3.4.9 are vulnerable to Arbitrary Code Execution via the U.set() and U.get() functions. El paquete total.js versiones anteriores a 3.4.9, son vulnerables a una ejecución de código arbitraria por medio de las funciones U.set() y U.get() • https://github.com/totaljs/framework/blob/master/utils.js%23L6606-L6631 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-23344 – Remote Code Execution (RCE)
https://notcve.org/view.php?id=CVE-2021-23344
04 Mar 2021 — The package total.js before 3.4.8 are vulnerable to Remote Code Execution (RCE) via set. El paquete total.js versiones anteriores a 3.4.8, es vulnerable a una ejecución de código remota (RCE) por medio de set • https://github.com/totaljs/framework/commit/c812bbcab8981797d3a1b9993fc42dad3d246f04 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-28494 – Command Injection
https://notcve.org/view.php?id=CVE-2020-28494
02 Feb 2021 — This affects the package total.js before 3.4.7. The issue occurs in the image.pipe and image.stream functions. The type parameter is used to build the command that is then executed using child_process.spawn. The issue occurs because child_process.spawn is called with the option shell set to true and because the type parameter is not properly sanitized. Esto afecta al paquete total.js versiones anteriores a 3.4.7. • https://github.com/totaljs/framework/commit/6192491ab2631e7c1d317c221f18ea613e2c18a5 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-28495 – Prototype Pollution
https://notcve.org/view.php?id=CVE-2020-28495
02 Feb 2021 — This affects the package total.js before 3.4.7. The set function can be used to set a value into the object according to the path. However the keys of the path being set are not properly sanitized, leading to a prototype pollution vulnerability. The impact depends on the application. In some cases it is possible to achieve Denial of service (DoS), Remote Code Execution or Property Injection. • https://docs.totaljs.com/latest/en.html%23api~FrameworkUtils~U.set •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2019-8903 – Total.js Prior to 3.2.4 Directory Traversal
https://notcve.org/view.php?id=CVE-2019-8903
18 Feb 2019 — index.js in Total.js Platform before 3.2.3 allows path traversal. index.js en la plataforma Total.js, en versiones anteriores a la 3.2.3, permite un salto de directorio. • https://packetstorm.news/files/id/181064 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •