Description
An issue was discovered in Total.js CMS 12.0.0. An authenticated user with the Pages privilege can conduct a path traversal attack (../) to include .html files that are outside the permitted directory. Also, if a page contains a template directive, then the directive will be server side processed. Thus, if a user can control the content of a .html file, then they can inject a payload with a malicious template directive to gain Remote Command Execution. The exploit will work only with the .html extension.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-4846 | An issue was discovered in Total.js CMS 12.0.0. An authenticated user with the Pages privilege can conduct a path traversal attack (../) to include .html files that are outside the permitted directory. Also, if a page contains a template directive, then the directive will be server side processed. Thus, if a user can control the content of a .html file, then they can inject a payload with a malicious template directive to gain Remote Command Execution. The exploit will work only with the .html extension. |
Github GHSA |
GHSA-pwvp-h579-hfxg | Total.js CMS Path Traversal |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T01:03:32.572Z
Reserved: 2019-09-05T00:00:00.000Z
Link: CVE-2019-15952
No data.
Status : Modified
Published: 2019-09-05T19:16:31.863
Modified: 2024-11-21T04:29:48.513
Link: CVE-2019-15952
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA