header-logo
Suggest Exploit
vendor:
Forma LMS
by:
Hemant Patidar (HemantSolo)
8.8
CVSS
HIGH
Stored Cross-Site Scripting
79
CWE
Product Name: Forma LMS
Affected Version From: 2.3
Affected Version To: 2.3
Patch Exists: NO
Related CWE: N/A
CPE: 2.3:Forma_LMS
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10/Kali Linux
2020

Forma LMS 2.3 – ‘First & Last Name’ Stored Cross-Site Scripting

Forma LMS 2.3 is vulnerable to stored cross-site scripting. An attacker can inject malicious JavaScript code in the 'First & Last Name' field of the user profile. When the user visits the profile page, the malicious code will be executed in the user's browser.

Mitigation:

Input validation should be used to prevent malicious code from being stored in the database. The application should also sanitize the output to prevent the malicious code from being executed.
Source

Exploit-DB raw data:

# Exploit Title: Forma LMS 2.3 - 'First & Last Name' Stored Cross-Site Scripting 
# Date: 04-12-2020
# Exploit Author: Hemant Patidar (HemantSolo)
# Vendor Homepage: https://www.formalms.org/download.html
# Software Link: https://www.formalms.org/
# Version: 2.3
# Tested on: Windows 10/Kali Linux

Steps-To-Reproduce:
1. Go to the Forma LMS and login to your account.
2. Now go to the User Profile.
3. Now Edit the profile.
4. Put the below payload in first and last name:
"<script>alert(document.cookie)</script>"
5. Now click on Save button.
6. The XSS will be triggered.