Filtered by vendor Totaljs
Subscriptions
Filtered by product Total.js Cms
Subscriptions
Total
7 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2020-9381 | 1 Totaljs | 1 Total.js Cms | 2024-11-21 | 7.5 High |
controllers/admin.js in Total.js CMS 13 allows remote attackers to execute arbitrary code via a POST to the /admin/api/widgets/ URI. This can be exploited in conjunction with CVE-2019-15954. | ||||
CVE-2019-15955 | 1 Totaljs | 1 Total.js Cms | 2024-11-21 | N/A |
An issue was discovered in Total.js CMS 12.0.0. A low privilege user can perform a simple transformation of a cookie to obtain the random values inside it. If an attacker can discover a session cookie owned by an admin, then it is possible to brute force it with O(n)=2n instead of O(n)=n^x complexity, and steal the admin password. | ||||
CVE-2019-15954 | 1 Totaljs | 1 Total.js Cms | 2024-11-21 | 9.9 Critical |
An issue was discovered in Total.js CMS 12.0.0. An authenticated user with the widgets privilege can gain achieve Remote Command Execution (RCE) on the remote server by creating a malicious widget with a special tag containing JavaScript code that will be evaluated server side. In the process of evaluating the tag by the back-end, it is possible to escape the sandbox object by using the following payload: <script total>global.process.mainModule.require(child_process).exec(RCE);</script> | ||||
CVE-2019-15953 | 1 Totaljs | 1 Total.js Cms | 2024-11-21 | N/A |
An issue was discovered in Total.js CMS 12.0.0. An authenticated user with limited privileges can get access to a resource that they do not own by calling the associated API. The product correctly manages privileges only for the front-end resource path, not for API requests. This leads to vertical and horizontal privilege escalation. | ||||
CVE-2019-15952 | 1 Totaljs | 1 Total.js Cms | 2024-11-21 | N/A |
An issue was discovered in Total.js CMS 12.0.0. An authenticated user with the Pages privilege can conduct a path traversal attack (../) to include .html files that are outside the permitted directory. Also, if a page contains a template directive, then the directive will be server side processed. Thus, if a user can control the content of a .html file, then they can inject a payload with a malicious template directive to gain Remote Command Execution. The exploit will work only with the .html extension. | ||||
CVE-2019-10260 | 1 Totaljs | 1 Total.js Cms | 2024-11-21 | N/A |
Total.js CMS 12.0.0 has XSS related to themes/admin/views/index.html (item.message) and themes/admin/public/ui.js (column.format). | ||||
CVE-2024-48655 | 1 Totaljs | 1 Total.js Cms | 2024-10-29 | 8.8 High |
An issue in Total.js CMS v.1.0 allows a remote attacker to execute arbitrary code via the func.js file. |
Page 1 of 1.