Page 4 of 23 results (0.007 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

This affects the package total.js before 3.4.7. The set function can be used to set a value into the object according to the path. However the keys of the path being set are not properly sanitized, leading to a prototype pollution vulnerability. The impact depends on the application. In some cases it is possible to achieve Denial of service (DoS), Remote Code Execution or Property Injection. • https://docs.totaljs.com/latest/en.html%23api~FrameworkUtils~U.set https://github.com/totaljs/framework/blob/master/utils.js%23L6606 https://github.com/totaljs/framework/blob/master/utils.js%23L6617 https://github.com/totaljs/framework/commit/b3f901561d66ab799a4a99279893b94cad7ae4ff https://snyk.io/vuln/SNYK-JS-TOTALJS-1046671 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

controllers/admin.js in Total.js CMS 13 allows remote attackers to execute arbitrary code via a POST to the /admin/api/widgets/ URI. This can be exploited in conjunction with CVE-2019-15954. El archivo controllers/admin.js en Total.js CMS versión 13, permite a atacantes remotos ejecutar código arbitrario por medio de un POST en el URI /admin/api/widgets/. Esto puede ser explotado en conjunto con CVE-2019-15954. • https://github.com/saddean/research/blob/master/totaljs/Broken-acces-control.md https://github.com/totaljs/cms/commit/2a26c4c6a61d3fda4527a761716ef7e1c5f7c970 • CWE-863: Incorrect Authorization •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 2

An issue was discovered in Total.js CMS 12.0.0. An authenticated user with limited privileges can get access to a resource that they do not own by calling the associated API. The product correctly manages privileges only for the front-end resource path, not for API requests. This leads to vertical and horizontal privilege escalation. Se detectó un problema en Total.js CMS versión 12.0.0. • https://github.com/beerpwn/CVE/blob/master/Totaljs_disclosure_report/report_final.pdf https://seclists.org/fulldisclosure/2019/Sep/6 • CWE-862: Missing Authorization •

CVSS: 9.9EPSS: 47%CPEs: 1EXPL: 5

An issue was discovered in Total.js CMS 12.0.0. An authenticated user with the widgets privilege can gain achieve Remote Command Execution (RCE) on the remote server by creating a malicious widget with a special tag containing JavaScript code that will be evaluated server side. In the process of evaluating the tag by the back-end, it is possible to escape the sandbox object by using the following payload: <script total>global.process.mainModule.require(child_process).exec(RCE);</script> Se detectó un problema en Total.js CMS versión 12.0.0. Un usuario autenticado con el privilegio de widgets puede lograr la Ejecución Remota de Comandos (RCE) en el servidor remoto creando un widget malicioso con una etiqueta especial que contenga un código JavaScript que se evaluará en el server side. En el proceso de evaluación de la etiqueta por el back-end, es posible escapar del objeto sandbox utilizando la siguiente carga útil: • https://www.exploit-db.com/exploits/47531 http://packetstormsecurity.com/files/154924/Total.js-CMS-12-Widget-JavaScript-Code-Injection.html https://github.com/beerpwn/CVE/blob/master/Totaljs_disclosure_report/report_final.pdf https://seclists.org/fulldisclosure/2019/Sep/5 https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/totaljs_cms_widget_exec.rb • CWE-862: Missing Authorization •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 2

An issue was discovered in Total.js CMS 12.0.0. A low privilege user can perform a simple transformation of a cookie to obtain the random values inside it. If an attacker can discover a session cookie owned by an admin, then it is possible to brute force it with O(n)=2n instead of O(n)=n^x complexity, and steal the admin password. Se detectó un problema en Total.js CMS versión 12.0.0. Un usuario con pocos privilegios puede realizar una transformación simple de una cookie para obtener los valores aleatorios dentro de ella. • https://github.com/beerpwn/CVE/blob/master/Totaljs_disclosure_report/report_final.pdf https://seclists.org/fulldisclosure/2019/Sep/3 • CWE-327: Use of a Broken or Risky Cryptographic Algorithm CWE-330: Use of Insufficiently Random Values •