Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTNxMzItajU3dy1xNHc3
Path Traversal in total.js
Affected versions of total.js
are vulnerable to Path Traversal. Due to insufficient input sanitization in URLs, attackers can access server files outside the /public
folder by using relative paths.
The files served are limited to these file types: flac
, jpg
, jpeg
, png
, gif
, ico
, js
, css
, txt
, xml
, woff
, woff2
, otf
, ttf
, eot
, svg
, zip
, rar
, pdf
, docx
, xlsx
, doc
, xls
, html
, htm
, appcache
, manifest
, map
, ogv
, ogg
, mp4
, mp3
, webp
, webm
, swf
, package
, json
, md
, m4v
, jsx
, heif
, heic
.
Recommendation
- If you are using version 2.1.x, upgrade to 2.1.1 or later.
- If you are using version 2.2.x, upgrade to 2.2.1 or later.
- If you are using version 2.3.x, upgrade to 2.3.1 or later.
- If you are using version 2.4.x, upgrade to 2.4.1 or later.
- If you are using version 2.5.x, upgrade to 2.5.1 or later.
- If you are using version 2.6.x, upgrade to 2.6.3 or later.
- If you are using version 2.7.x, upgrade to 2.7.1 or later.
- If you are using version 2.8.x, upgrade to 2.8.1 or later.
- If you are using version 2.9.x, upgrade to 2.9.5 or later.
- If you are using version 3.0.x, upgrade to 3.0.1 or later.
- If you are using version 3.1.x, upgrade to 3.1.1 or later.
- If you are using version 3.2.x, upgrade to 3.2.4 or later.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTNxMzItajU3dy1xNHc3
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 6 years ago
Updated: almost 2 years ago
CVSS Score: 7.5
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Percentage: 0.14579
EPSS Percentile: 0.95876
Identifiers: GHSA-3q32-j57w-q4w7, CVE-2019-8903
References:
- https://nvd.nist.gov/vuln/detail/CVE-2019-8903
- https://github.com/advisories/GHSA-3q32-j57w-q4w7
- https://www.npmjs.com/advisories/1026
- https://github.com/totaljs/framework/commit/c37cafbf3e379a98db71c1125533d1e8d5b5aef7
- https://github.com/totaljs/framework/commit/de16238d13848149f5d1dae51f54e397a525932b
- https://blog.certimetergroup.com/it/articolo/security/total.js-directory-traversal-cve-2019-8903
Blast Radius: 15.5
Affected Packages
npm:total.js
Dependent packages: 14Dependent repositories: 117
Downloads: 3,778 last month
Affected Version Ranges: < 3.2.3
Fixed in: 3.2.3
All affected versions: 0.0.1, 1.0.0, 1.0.1, 1.0.2, 1.1.0, 1.2.0, 1.2.1, 1.2.3, 1.3.0, 1.3.1, 1.4.0, 1.5.0, 1.5.1, 1.5.2, 1.5.3, 1.6.0, 1.6.1, 1.6.2, 1.6.3, 1.6.4, 1.7.0, 1.7.1, 1.7.2, 1.8.0, 1.9.0, 1.9.1, 1.9.2, 1.9.3, 1.9.4, 1.9.5, 1.9.6, 1.9.7, 1.9.8, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.1.0, 2.1.1, 2.2.0, 2.2.1, 2.3.0, 2.3.1, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.7.0, 2.7.1, 2.8.0, 2.8.1, 2.9.0, 2.9.1, 2.9.2, 2.9.3, 2.9.4, 2.9.5, 2.9.30, 3.0.0, 3.0.1, 3.1.0, 3.1.1, 3.2.0, 3.2.1, 3.2.2
All unaffected versions: 3.2.3, 3.2.4, 3.3.0, 3.3.1, 3.3.2, 3.4.0, 3.4.1, 3.4.2, 3.4.3, 3.4.4, 3.4.5, 3.4.6, 3.4.7, 3.4.8, 3.4.9, 3.4.10, 3.4.11, 3.4.12, 3.4.13, 3.4.20