CVE-2020-28494 – Command Injection
https://notcve.org/view.php?id=CVE-2020-28494
This affects the package total.js before 3.4.7. The issue occurs in the image.pipe and image.stream functions. The type parameter is used to build the command that is then executed using child_process.spawn. The issue occurs because child_process.spawn is called with the option shell set to true and because the type parameter is not properly sanitized. Esto afecta al paquete total.js versiones anteriores a 3.4.7. • https://github.com/totaljs/framework/commit/6192491ab2631e7c1d317c221f18ea613e2c18a5 https://snyk.io/vuln/SNYK-JS-TOTALJS-1046672 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2020-28495 – Prototype Pollution
https://notcve.org/view.php?id=CVE-2020-28495
This affects the package total.js before 3.4.7. The set function can be used to set a value into the object according to the path. However the keys of the path being set are not properly sanitized, leading to a prototype pollution vulnerability. The impact depends on the application. In some cases it is possible to achieve Denial of service (DoS), Remote Code Execution or Property Injection. • https://docs.totaljs.com/latest/en.html%23api~FrameworkUtils~U.set https://github.com/totaljs/framework/blob/master/utils.js%23L6606 https://github.com/totaljs/framework/blob/master/utils.js%23L6617 https://github.com/totaljs/framework/commit/b3f901561d66ab799a4a99279893b94cad7ae4ff https://snyk.io/vuln/SNYK-JS-TOTALJS-1046671 •
CVE-2019-8903 – Total.js Prior To 3.2.4 Directory Traversal
https://notcve.org/view.php?id=CVE-2019-8903
index.js in Total.js Platform before 3.2.3 allows path traversal. index.js en la plataforma Total.js, en versiones anteriores a la 3.2.3, permite un salto de directorio. • https://github.com/ossf-cve-benchmark/CVE-2019-8903 https://blog.certimetergroup.com/it/articolo/security/total.js-directory-traversal-cve-2019-8903 https://github.com/totaljs/framework/commit/c37cafbf3e379a98db71c1125533d1e8d5b5aef7 https://github.com/totaljs/framework/commit/de16238d13848149f5d1dae51f54e397a525932b https://blog.totaljs.com/blogs/news/20190213-a-critical-security-fix https://security.snyk.io/vuln/SNYK-JS-TOTALJS-173710 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •