This Metasploit module check and exploits a directory traversal vulnerability in Total.js prior to 3.2.4. Here is a list of accepted extensions: flac, jpg, jpeg, png, gif, ico, js, css, txt, xml, woff, woff2, otf, ttf, eot, svg, zip, rar, pdf, docx, xlsx, doc, xls, html, htm, appcache, manifest, map, ogv, ogg, mp4, mp3, webp, webm, swf, package, json, md, m4v, jsx, heif, heic.
62c4f347fef628a4909ab5a3ca0be5d96b1c9558b693d37ca09953ff8036bc67
CMS Made Simple version 2.2.15 suffers from a remote shell upload vulnerability.
2cadbab965f878e44ea0acc56a8ffd9d1c8276f1fe9da36588406a2934542549
CMS Made Simple version 2.2.15 suffers from a remote SQL injection vulnerability.
3f21f4e492d11451203a608c3eae00dbd7eca2a00545ae32201c11b597edcf87
This Metasploit module exploits a vulnerability in Total.js CMS. The issue is that a user with admin permission can embed a malicious JavaScript payload in a widget, which is evaluated server side, and gain remote code execution.
994055352fee2d951e405c99aeadd99178b2c65c81e77f2f5498366d48a48c14
Totaljs CMS version 12.0 suffers from a broken access control on an API call.
fdf156b531b1d3da98ee95bbd5364b284446474608142fd65919a9598d6d86a7
Totaljs CMS version 12.0 suffers from an authenticated code injection vulnerability during widget creation.
e84a3b40aad34be56be0995eaa9961a7ed8b23cec1171398351a1e261546a2b6
Totaljs CMS version 12.0 mints an insecure cookie that can be used to crack the administrator password.
6df69239605e353638050aa0d99b6229a04afd43b2e3d8b39f3f681e5e2d1305
Totaljs CMS version 12.0 suffers from a path traversal vulnerability.
9b5f7333d390a6dfbc2864452ec1c372bb2acd344d08dc82ae02bfc49c40aae5