Описание
An issue was discovered in Total.js CMS 12.0.0. An authenticated user with the widgets privilege can gain achieve Remote Command Execution (RCE) on the remote server by creating a malicious widget with a special tag containing JavaScript code that will be evaluated server side. In the process of evaluating the tag by the back-end, it is possible to escape the sandbox object by using the following payload:
Ссылки
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party Advisory
- ExploitMailing ListThird Party Advisory
- ExploitThird Party AdvisoryVDB Entry
- ExploitThird Party Advisory
- ExploitMailing ListThird Party Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:totaljs:total.js_cms:12.0.0:*:*:*:*:*:*:*
EPSS
Процентиль: 98%
0.56909
Средний
9.9 Critical
CVSS3
9 Critical
CVSS2
Дефекты
CWE-862
Связанные уязвимости
EPSS
Процентиль: 98%
0.56909
Средний
9.9 Critical
CVSS3
9 Critical
CVSS2
Дефекты
CWE-862