Show filters
3 Total Results
Displaying 1-3 of 3
Sort by:
Attacker Value
High

CVE-2019-15954: Total.js CMS 12 Widget Remote Code Execution

Disclosure Date: September 05, 2019 (last updated March 06, 2020)
Total.js is a Node.js Framework for building e-commerce applications, REST services, real-time apps, or apps for Internet of Things (IoT), etc. Total.js CMS is a Content Management System (application) that is part of the Total.js framework. A commercial version is also available, and can be seen used world-wide. In Total.js CMS, a user with admin permission may be able to create a widget, and extend CMS functionalities for visitors. However, this can also be abused to upload JavaScript code that will be evaluated server side. As a result, it is possible to embed malicious JavaScript in the new widget, and gain remote code execution.
0
Attacker Value
Unknown

CVE-2020-9381

Disclosure Date: February 24, 2020 (last updated February 21, 2025)
controllers/admin.js in Total.js CMS 13 allows remote attackers to execute arbitrary code via a POST to the /admin/api/widgets/ URI. This can be exploited in conjunction with CVE-2019-15954.
Attacker Value
Unknown

CVE-2019-15954

Disclosure Date: September 05, 2019 (last updated November 27, 2024)
An issue was discovered in Total.js CMS 12.0.0. An authenticated user with the widgets privilege can gain achieve Remote Command Execution (RCE) on the remote server by creating a malicious widget with a special tag containing JavaScript code that will be evaluated server side. In the process of evaluating the tag by the back-end, it is possible to escape the sandbox object by using the following payload: <script total>global.process.mainModule.require(child_process).exec(RCE);</script>