
13 changes to exploits/shellcodes IDT PC Audio 1.0.6499.0 - 'STacSV' Unquoted Service Path Chromium 83 - Full CSP Bypass Wordpress Plugin Canto 1.3.0 - Blind SSRF (Unauthenticated) Composr CMS 10.0.34 - 'banners' Persistent Cross Site Scripting Phpscript-sgh 0.1.0 - Time Based Blind SQL Injection MiniCMS 1.10 - 'content box' Stored XSS Testa Online Test Management System 3.4.7 - 'q' SQL Injection Savsoft Quiz 5 - 'field_title' Stored Cross-Site Scripting Forma LMS 2.3 - 'First & Last Name' Stored Cross-Site Scripting Laravel Nova 3.7.0 - 'range' DoS CMS Made Simple 2.2.15 - Stored Cross-Site Scripting via SVG File Upload (Authenticated) Zabbix 5.0.0 - Stored XSS via URL Widget Iframe
16 lines
No EOL
589 B
Text
16 lines
No EOL
589 B
Text
# Exploit Title: Forma LMS 2.3 - 'First & Last Name' Stored Cross-Site Scripting
|
|
# Date: 04-12-2020
|
|
# Exploit Author: Hemant Patidar (HemantSolo)
|
|
# Vendor Homepage: https://www.formalms.org/download.html
|
|
# Software Link: https://www.formalms.org/
|
|
# Version: 2.3
|
|
# Tested on: Windows 10/Kali Linux
|
|
|
|
Steps-To-Reproduce:
|
|
1. Go to the Forma LMS and login to your account.
|
|
2. Now go to the User Profile.
|
|
3. Now Edit the profile.
|
|
4. Put the below payload in first and last name:
|
|
"<script>alert(document.cookie)</script>"
|
|
5. Now click on Save button.
|
|
6. The XSS will be triggered. |