| ID |
CVE-2019-15954
|
| Sažetak |
An issue was discovered in Total.js CMS 12.0.0. An authenticated user with the widgets privilege can gain achieve Remote Command Execution (RCE) on the remote server by creating a malicious widget with a special tag containing JavaScript code that will be evaluated server side. In the process of evaluating the tag by the back-end, it is possible to escape the sandbox object by using the following payload: <script total>global.process.mainModule.require(child_process).exec(RCE);</script> |
| Reference |
|
| CVSS |
| Base: | 9.0 |
| Impact: | 10.0 |
| Exploitability: | 8.0 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| NETWORK |
LOW |
SINGLE |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| COMPLETE |
COMPLETE |
COMPLETE |
|
| CVSS vektor |
AV:N/AC:L/Au:S/C:C/I:C/A:C |
| Zadnje važnije ažuriranje |
01-01-2022 - 20:18 |
| Objavljeno |
05-09-2019 - 19:16 |