total4@0.0.1-22 vulnerabilities

Total.js framework v4

  • latest version

    0.0.97

  • latest non vulnerable version

  • first published

    4 years ago

  • latest version published

    4 months ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the total4 package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Cross-site Scripting (XSS)

    total4 is a framework for Node.js platform written in pure JavaScript similar to PHP's Laravel or Python's Django or ASP.NET MVC. It can be used as a web, desktop, service, or IoT application.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper user-input sanitization via the platform name field in the settings module.

    How to fix Cross-site Scripting (XSS)?

    Upgrade total4 to version 0.0.81 or higher.

    <0.0.81
    • C
    Arbitrary Code Execution

    total4 is a framework for Node.js platform written in pure JavaScript similar to PHP's Laravel or Python's Django or ASP.NET MVC. It can be used as a web, desktop, service, or IoT application.

    Affected versions of this package are vulnerable to Arbitrary Code Execution via the U.set() and U.get() functions.

    PoC by Alessio Della Libera

    const total = require('total4');
    U.set({}, 'a;let {mainModule}=process; let {require}=mainModule; let {exec}=require("child_process"); exec("touch HACKED")//');
    

    How to fix Arbitrary Code Execution?

    Upgrade total4 to version 0.0.43 or higher.

    <0.0.43