Description
An issue was discovered in Total.js CMS 12.0.0. An authenticated user with the widgets privilege can gain achieve Remote Command Execution (RCE) on the remote server by creating a malicious widget with a special tag containing JavaScript code that will be evaluated server side. In the process of evaluating the tag by the back-end, it is possible to escape the sandbox object by using the following payload:
Remediation
References
http://packetstormsecurity.com/files/154924/Total.js-CMS-12-Widget-JavaScript-Code-Injection.html
https://github.com/beerpwn/CVE/blob/master/Totaljs_disclosure_report/report_final.pdf
https://seclists.org/fulldisclosure/2019/Sep/5
Related Vulnerabilities
CVE-2023-1784 Vulnerability in maven package org.jeecgframework.boot:jeecg-boot-parent
CVE-2023-49371 Vulnerability in maven package com.ruoyi:ruoyi
CVE-2022-21169 Vulnerability in npm package express-xss-sanitizer
CVE-2020-7762 Vulnerability in npm package jsreport-chrome-pdf
CVE-2020-28487 Vulnerability in maven package org.webjars.npm:vis-timeline