Ethical Hacking Automation

Automate Recon and scanning process with Vidoc. All security teams in one place

Academy Learning Management System 5.11 - Cross-Site Scripting

By kannthu

Medium
Vidoc logoVidoc Module
#packetstorm#lms#academy#xss
Description

Academy Learning Management System 5.11 - Cross-Site Scripting

What is the "Academy Learning Management System 5.11 - Cross-Site Scripting?"

The "Academy Learning Management System 5.11 - Cross-Site Scripting" module is designed to detect a cross-site scripting vulnerability in the Academy Learning Management System version 5.11. This vulnerability allows an attacker to inject arbitrary scripts into the browser, potentially leading to unauthorized access or data theft. The severity of this vulnerability is classified as medium.

Impact

If exploited, this cross-site scripting vulnerability can have serious consequences. Attackers can use it to execute malicious scripts on the victim's browser, potentially stealing sensitive information, such as login credentials or personal data. This can lead to unauthorized access, data breaches, and other security risks.

How does the module work?

The module works by sending HTTP requests to the targeted Academy Learning Management System version 5.11 installation and checking for specific conditions. It searches for the presence of the injected script and verifies that the response is in the expected format (text/html) with a status code of 200.

Here is an example of an HTTP request sent by the module:

GET /search?query=%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1
Host: [target_host]

The module then evaluates the response using matching conditions. It checks if the response body contains the injected script ("") and the term "Academy LMS". Additionally, it verifies that the response header includes the content type "text/html" and the status code is 200.

If all the matching conditions are met, the module reports the presence of the cross-site scripting vulnerability.

Classification:

CWE-ID: CWE-80

CVSS-Metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

CVSS-Score: 5.4

Note: This module was authored by arafatansari.

Module preview

Concurrent Requests (1)
1. HTTP Request template
GET/search?query=%22%3E...
Matching conditions
word: <script>alert(document.domain)</script>,...and
word: text/htmland
status: 200
Passive global matcher
No matching conditions.
On match action
Report vulnerability