Affected versions of total.js
are vulnerable to Path Traversal. Due to insufficient input sanitization in URLs, attackers can access server files outside the /public
folder by using relative paths.
The files served are limited to these file types: flac
, jpg
, jpeg
, png
, gif
, ico
, js
, css
, txt
, xml
, woff
, woff2
, otf
, ttf
, eot
, svg
, zip
, rar
, pdf
, docx
, xlsx
, doc
, xls
, html
, htm
, appcache
, manifest
, map
, ogv
, ogg
, mp4
, mp3
, webp
, webm
, swf
, package
, json
, md
, m4v
, jsx
, heif
, heic
.
blog.certimetergroup.com/it/articolo/security/total.js-directory-traversal-cve-2019-8903
github.com/advisories/GHSA-3q32-j57w-q4w7
github.com/totaljs/framework
github.com/totaljs/framework/commit/c37cafbf3e379a98db71c1125533d1e8d5b5aef7
github.com/totaljs/framework/commit/de16238d13848149f5d1dae51f54e397a525932b
nvd.nist.gov/vuln/detail/CVE-2019-8903
www.npmjs.com/advisories/1026