Description
An issue was discovered in Total.js CMS 12.0.0. An authenticated user with the widgets privilege can gain achieve Remote Command Execution (RCE) on the remote server by creating a malicious widget with a special tag containing JavaScript code that will be evaluated server side. In the process of evaluating the tag by the back-end, it is possible to escape the sandbox object by using the following payload:
Remediation
References
http://packetstormsecurity.com/files/154924/Total.js-CMS-12-Widget-JavaScript-Code-Injection.html
https://github.com/beerpwn/CVE/blob/master/Totaljs_disclosure_report/report_final.pdf
https://seclists.org/fulldisclosure/2019/Sep/5
Related Vulnerabilities
CVE-2023-48711 Vulnerability in maven package org.webjars.npm:google-translate-api-browser
CVE-2022-25895 Vulnerability in npm package lite-dev-server
CVE-2021-23359 Vulnerability in npm package port-killer
CVE-2023-26117 Vulnerability in npm package angular
CVE-2020-28472 Vulnerability in npm package @aws-sdk/shared-ini-file-loader