GHSA-v287-9w3v-x5c5

Suggest an improvement
Source
https://github.com/advisories/GHSA-v287-9w3v-x5c5
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-v287-9w3v-x5c5/GHSA-v287-9w3v-x5c5.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-v287-9w3v-x5c5
Aliases
  • CVE-2019-15954
Published
2022-05-24T16:55:31Z
Modified
2023-11-08T04:01:15.614045Z
Severity
  • 9.9 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
Total.js CMS RCE Vulnerability
Details

An issue was discovered in Total.js CMS 12.0.0. An authenticated user with the widgets privilege can gain achieve Remote Command Execution (RCE) on the remote server by creating a malicious widget with a special tag containing JavaScript code that will be evaluated server side. In the process of evaluating the tag by the back-end, it is possible to escape the sandbox object by using the following payload: &lt;script total>global.process.mainModule.require(child_process).exec(RCE);</script>

Database specific
{
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-77",
        "CWE-862"
    ],
    "nvd_published_at": "2019-09-05T19:16:00Z",
    "github_reviewed_at": "2023-07-17T23:14:57Z",
    "severity": "CRITICAL"
}
References

Affected packages

npm / total4

Package

Affected ranges

Affected versions

12.*

12.0.0