Skip to content

Formalms Exposed Installation

ID: formalms-install

Severity: high

Author: princechaddha

Tags: misconfig,formalms

Formalms Installation is exposed.

id: formalms-install
info:
name: Formalms Exposed Installation
author: princechaddha
severity: high
description: Formalms Installation is exposed.
metadata:
max-request: 1
tags: misconfig,formalms
http:
- method: GET
path:
- '{{BaseURL}}/install/'
matchers-condition: and
matchers:
- type: word
part: body
words:
- '<title>forma.lms installer</title>'
- '<h1>forma.lms - Installation</h1>'
condition: and
- type: status
status:
- 200
# digest: 4b0a00483046022100b959663f7b5376e9086b4fba1a8c52e5c2f68c2c5c317542383397e45a95861f0221008cdd4ea40a3ee621df95e7be09af9eb0823b6658bc2a998ebdfaf9f0006ff84c:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/misconfiguration/formalms-install.yaml"

View on Github