CVE-2019-15953
https://notcve.org/view.php?id=CVE-2019-15953
An issue was discovered in Total.js CMS 12.0.0. An authenticated user with limited privileges can get access to a resource that they do not own by calling the associated API. The product correctly manages privileges only for the front-end resource path, not for API requests. This leads to vertical and horizontal privilege escalation. Se detectó un problema en Total.js CMS versión 12.0.0. • https://github.com/beerpwn/CVE/blob/master/Totaljs_disclosure_report/report_final.pdf https://seclists.org/fulldisclosure/2019/Sep/6 • CWE-862: Missing Authorization •
CVE-2019-15954 – Total.js CMS 12 - Widget JavaScript Code Injection
https://notcve.org/view.php?id=CVE-2019-15954
An issue was discovered in Total.js CMS 12.0.0. An authenticated user with the widgets privilege can gain achieve Remote Command Execution (RCE) on the remote server by creating a malicious widget with a special tag containing JavaScript code that will be evaluated server side. In the process of evaluating the tag by the back-end, it is possible to escape the sandbox object by using the following payload: <script total>global.process.mainModule.require(child_process).exec(RCE);</script> Se detectó un problema en Total.js CMS versión 12.0.0. Un usuario autenticado con el privilegio de widgets puede lograr la Ejecución Remota de Comandos (RCE) en el servidor remoto creando un widget malicioso con una etiqueta especial que contenga un código JavaScript que se evaluará en el server side. En el proceso de evaluación de la etiqueta por el back-end, es posible escapar del objeto sandbox utilizando la siguiente carga útil: • https://www.exploit-db.com/exploits/47531 http://packetstormsecurity.com/files/154924/Total.js-CMS-12-Widget-JavaScript-Code-Injection.html https://github.com/beerpwn/CVE/blob/master/Totaljs_disclosure_report/report_final.pdf https://seclists.org/fulldisclosure/2019/Sep/5 • CWE-862: Missing Authorization •
CVE-2019-15955
https://notcve.org/view.php?id=CVE-2019-15955
An issue was discovered in Total.js CMS 12.0.0. A low privilege user can perform a simple transformation of a cookie to obtain the random values inside it. If an attacker can discover a session cookie owned by an admin, then it is possible to brute force it with O(n)=2n instead of O(n)=n^x complexity, and steal the admin password. Se detectó un problema en Total.js CMS versión 12.0.0. Un usuario con pocos privilegios puede realizar una transformación simple de una cookie para obtener los valores aleatorios dentro de ella. • https://github.com/beerpwn/CVE/blob/master/Totaljs_disclosure_report/report_final.pdf https://seclists.org/fulldisclosure/2019/Sep/3 • CWE-327: Use of a Broken or Risky Cryptographic Algorithm CWE-330: Use of Insufficiently Random Values •
CVE-2019-15952 – Totaljs CMS 12.0 Path Traversal
https://notcve.org/view.php?id=CVE-2019-15952
An issue was discovered in Total.js CMS 12.0.0. An authenticated user with the Pages privilege can conduct a path traversal attack (../) to include .html files that are outside the permitted directory. Also, if a page contains a template directive, then the directive will be server side processed. Thus, if a user can control the content of a .html file, then they can inject a payload with a malicious template directive to gain Remote Command Execution. The exploit will work only with the .html extension. • http://packetstormsecurity.com/files/154340/Totaljs-CMS-12.0-Path-Traversal.html http://seclists.org/fulldisclosure/2019/Sep/11 https://github.com/beerpwn/CVE/blob/master/Totaljs_disclosure_report/report_final.pdf https://seclists.org/fulldisclosure/2019/Sep/2 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2019-10260
https://notcve.org/view.php?id=CVE-2019-10260
Total.js CMS 12.0.0 has XSS related to themes/admin/views/index.html (item.message) and themes/admin/public/ui.js (column.format). Total.js CMS, en su versión 12.0.0, tiene Cross-Site Scripting (XSS) relacionado con themes/admin/views/index.html (item.message) y themes/admin/public/ui.js (column.format). • https://github.com/totaljs/cms/commit/75205f93009db3cf8c0b0f4f1fc8ab82d70da8ad https://github.com/totaljs/cms/commit/8b9d7dada998c08d172481d9f0fc0397c4b3c78d • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •