Version 3.4.20

total.js

Node.js framework

Install Instructions

npm install total.js
Current Version Release Date November 08, 2021
Package URL (purl) pkg:npm/total.js@3.4.20

Find total.js vulnerabilities in your supply chain.

Scan for Free

total.js Vulnerabilities

Sort by
icon CVE (Latest)
  • icon CVE (Latest)
  • icon CVE (Oldest)
  • icon CVSS Score (Highest)
  • icon CVSS Score (Lowest)
CVE question mark icon CVSS Score question mark icon CWE(s) question mark icon EPSS Score question mark icon EPSS % question mark icon Impacted Versions
CVE-2019-10260 Medium 6.1 CWE-79 0.00066 0.31038
  • 3.0.0–3.3.0-12
  • 2.0.0–2.9.30
  • 1.0.0–1.9.8
  • 0.0.1
CVE-2019-15953 High 8.8 CWE-862 0.00165 0.54247
  • 3.0.0–3.4.20
  • 2.0.0–2.9.30
  • 1.0.0–1.9.8
  • 0.0.1
CVE-2019-8903 High 7.5 CWE-22 0.14579 0.95938
  • 3.0.0–3.2.2
  • 2.0.0–2.9.30
  • 1.0.0–1.9.8
  • 0.0.1
CVE-2020-28494 High 8.6 CWE-77, CWE-78 0.00392 0.74102
  • 3.0.0–3.4.6-6
  • 2.0.0–2.9.30
  • 1.0.0–1.9.8
  • 0.0.1
CVE-2020-28495 High 7.3 CWE-1321 0.00622 0.7951
  • 3.0.0–3.4.6-6
  • 2.0.0–2.9.30
  • 1.0.0–1.9.8
  • 0.0.1
CVE-2021-23344 High 9.8 CWE-94 0.01371 0.86821
  • 3.0.0–3.4.6-6
  • 2.0.0–2.9.30
  • 1.0.0–1.9.8
  • 0.0.1
CVE-2021-23389 High 9.8 CWE-94 0.00756 0.81678
  • 3.0.0–3.4.8
  • 2.0.0–2.9.30
  • 1.0.0–1.9.8
  • 0.0.1
CVE-2021-32831 High 7.2 CWE-94 0.00623 0.7954
  • 3.0.0–3.4.8
  • 2.0.0–2.9.30
  • 1.0.0–1.9.8
  • 0.0.1
CVE-2019-15952 High 8.8 CWE-22 0.01483 0.87324
  • 3.1.0–3.3.3-15
CVE-2019-15954 High 9.9 CWE-77, CWE-862 0.35524 0.9726
  • 3.1.0–3.4.20

total.js Vulnerability Remediation Guidance

CVE Description Full list of Impacted Versions Fix
CVE-2021-32831 Total.js framework (npm package total.js) is a framework for Node.js platfrom written in pure JavaScript similar to PHP's Laravel or Python's Django or ASP.NET MVC. In total.js framework before version 3.4.9, calling the utils.set function with user-controlled values leads to code-injection. This can cause a variety of impacts that include arbitrary code execution. This is fixed in version 3.4.9. 1.9.7, 2.0.0-15, 1.9.7-27, 2.0.0-21, 1.9.7-28, 2.0.0-25, 2.0.0-30, 2.0.0-39 (Show all) Patch → NO_SAFE_VERSION
CVE-2021-23389 The package total.js before 3.4.9 are vulnerable to Arbitrary Code Execution via the U.set() and U.get() functions. 1.9.7, 2.0.0-15, 1.9.7-27, 2.0.0-21, 1.9.7-28, 2.0.0-25, 2.0.0-30, 2.0.0-39 (Show all) Patch → NO_SAFE_VERSION
CVE-2021-23344 The package total.js before 3.4.8 are vulnerable to Remote Code Execution (RCE) via set. 1.9.7, 2.0.0-15, 1.9.7-27, 2.0.0-21, 1.9.7-28, 2.0.0-25, 2.0.0-30, 2.0.0-39 (Show all) Patch → NO_SAFE_VERSION
CVE-2020-28495 This affects the package total.js before 3.4.7. The set function can be used to set a value into the object according to the path. However the keys of the path being set are not properly sanitized, leading to a prototype pollution vulnerability. The impact depends on the application. In some cases it is possible to achieve Denial of service (DoS), Remote Code Execution or Property Injection. 1.9.7, 2.0.0-15, 1.9.7-27, 2.0.0-21, 1.9.7-28, 2.0.0-25, 2.0.0-30, 2.0.0-39 (Show all) Patch → NO_SAFE_VERSION
CVE-2020-28494 This affects the package total.js before 3.4.7. The issue occurs in the image.pipe and image.stream functions. The type parameter is used to build the command that is then executed using child_process.spawn. The issue occurs because child_process.spawn is called with the option shell set to true and because the type parameter is not properly sanitized. 1.9.7, 2.0.0-15, 1.9.7-27, 2.0.0-21, 1.9.7-28, 2.0.0-25, 2.0.0-30, 2.0.0-39 (Show all) Patch → NO_SAFE_VERSION
CVE-2019-8903 index.js in Total.js Platform before 3.2.3 allows path traversal. 1.9.7, 2.0.0-15, 1.9.7-27, 2.0.0-21, 1.9.7-28, 2.0.0-25, 2.0.0-30, 2.0.0-39 (Show all) Patch → NO_SAFE_VERSION
CVE-2019-15954 An issue was discovered in Total.js CMS 12.0.0. An authenticated user with the widgets privilege can gain achieve Remote Command Execution (RCE) on the remote server by creating a malicious widget with a special tag containing JavaScript code that will be evaluated server side. In the process of evaluating the tag by the back-end, it is possible to escape the sandbox object by using the following payload: <script total>global.process.mainModule.require(child_process).exec(RCE);</script> 3.2.0-2, 3.2.0-6, 3.2.0-7, 3.2.0-9, 3.2.0, 3.3.0-3, 3.3.0-8, 3.3.0-10 (Show all) Patch → NO_SAFE_VERSION
CVE-2019-15953 An issue was discovered in Total.js CMS 12.0.0. An authenticated user with limited privileges can get access to a resource that they do not own by calling the associated API. The product correctly manages privileges only for the front-end resource path, not for API requests. This leads to vertical and horizontal privilege escalation. 1.9.7, 2.0.0-15, 1.9.7-27, 2.0.0-21, 1.9.7-28, 2.0.0-25, 2.0.0-30, 2.0.0-39 (Show all) Patch → NO_SAFE_VERSION
CVE-2019-15952 An issue was discovered in Total.js CMS 12.0.0. An authenticated user with the Pages privilege can conduct a path traversal attack (../) to include .html files that are outside the permitted directory. Also, if a page contains a template directive, then the directive will be server side processed. Thus, if a user can control the content of a .html file, then they can inject a payload with a malicious template directive to gain Remote Command Execution. The exploit will work only with the .html extension. 3.2.0-2, 3.2.0-6, 3.2.0-7, 3.2.0-9, 3.2.0, 3.3.0-3, 3.3.0-8, 3.3.0-10 (Show all) Patch → NO_SAFE_VERSION
CVE-2019-10260 Total.js CMS 12.0.0 has XSS related to themes/admin/views/index.html (item.message) and themes/admin/public/ui.js (column.format). 1.9.7, 2.0.0-15, 1.9.7-27, 2.0.0-21, 1.9.7-28, 2.0.0-25, 2.0.0-30, 2.0.0-39 (Show all) Patch → NO_SAFE_VERSION

Instantly see if these total.js vulnerabilities affect your code.

Scan for Free