ID |
CVE-2019-15954
|
Sažetak |
An issue was discovered in Total.js CMS 12.0.0. An authenticated user with the widgets privilege can gain achieve Remote Command Execution (RCE) on the remote server by creating a malicious widget with a special tag containing JavaScript code that will be evaluated server side. In the process of evaluating the tag by the back-end, it is possible to escape the sandbox object by using the following payload: <script total>global.process.mainModule.require(child_process).exec(RCE);</script> |
Reference |
|
CVSS |
Base: | 9.0 |
Impact: | 10.0 |
Exploitability: | 8.0 |
|
Pristup |
Vektor | Složenost | Autentikacija |
NETWORK |
LOW |
SINGLE |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
COMPLETE |
COMPLETE |
COMPLETE |
|
CVSS vektor |
AV:N/AC:L/Au:S/C:C/I:C/A:C |
Zadnje važnije ažuriranje |
01-01-2022 - 20:18 |
Objavljeno |
05-09-2019 - 19:16 |