lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 6 Aug 2018 12:15:12 +0200
From: Nikola Kojic <>
Subject: [FD] CVE-2018-12090 - LAMS < 3.1 Unauthenticated Cross-Site

# Exploit Title: LAMS < 3.1 - Unauthenticated Reflected XSS
# Date: 2018-08-06
# Exploit Author: Nikola Kojic
# Website:
# Vendor Homepage:
# Software Link:
# Category: Web Application
# Platform: Java
# Version: < 3.1
# CVE : 2018-12090

1. Vendor Description:
LAMS is a revolutionary new tool for designing, managing and delivering 
online collaborative learning activities. It provides teachers with a 
highly intuitive visual authoring environment for creating sequences of 
learning activities.

2. Technical Details and Exploitation:
There is unauthenticated reflected cross-site scripting (XSS) in LAMS 
before 3.1 that allows a remote attacker to introduce arbitrary 
JavaScript via manipulation of an unsanitized GET parameter during a 
forgotPasswordChange.jsp?key= password change.

3. Proof of Concept:

4. Solution:
The vendor has fixed the issues and released the patches.

5. Timeline:
2018-06-07: Discovered
2018-06-08: Vendor notified
2018-06-08: Vendor replies
2018-06-11: CVE number requested
2018-06-11: CVE number assigned
2018-06-15: Patch released
2018-08-05: Public disclosure

Sent through the Full Disclosure mailing list
Web Archives & RSS:

Powered by blists - more mailing lists