cve/2019/CVE-2019-5112.md
2025-09-29 21:09:30 +02:00

19 lines
1.2 KiB
Markdown

### [CVE-2019-5112](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5112)
![](https://img.shields.io/static/v1?label=Product&message=Forma&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=Forma%20LMS%202.2.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20('SQL%20Injection')&color=brightgreen)
### Description
Exploitable SQL injection vulnerability exists in the authenticated portion of Forma LMS 2.2.1. The /appLms/ajax.server.php URL and parameter filter_status was confirmed to suffer from SQL injections and could be exploited by authenticated attackers. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and, in certain configurations, access the underlying operating system.
### POC
#### Reference
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0904
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/adityatrivedi2/Threat-Modeling-for-LMS