Vulnerability Description
Exploitable SQL injection vulnerability exists in the authenticated portion of Forma LMS 2.2.1. The /appLms/ajax.server.php URL and parameter filter_status was confirmed to suffer from SQL injections and could be exploited by authenticated attackers. An attacker can send a web request with parameters containing SQL injection attacks to trigger this vulnerability, potentially allowing exfiltration of the database, user credentials and, in certain configurations, access the underlying operating system.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Formalms | Formalms | 2.2.1 |
Related Weaknesses (CWE)
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0904ExploitThird Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0904ExploitThird Party Advisory
FAQ
What is CVE-2019-5112?
CVE-2019-5112 is a vulnerability with a CVSS score of 8.8 (HIGH). Exploitable SQL injection vulnerability exists in the authenticated portion of Forma LMS 2.2.1. The /appLms/ajax.server.php URL and parameter filter_status was confirmed to suffer from SQL injections ...
How severe is CVE-2019-5112?
CVE-2019-5112 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-5112?
Check the references section above for vendor advisories and patch information. Affected products include: Formalms Formalms.