Intercom Solutions developer website SQLi

2018.06.04
ch Arm_Legi (CH) ch
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

# Exploit Title: Intercom Solutions developer website SQLi # dork : Google: inurl:index.jsp? intext:"sviluppato da intercom solutions" Bing: index.jsp?= "Sviluppato da Intercom Solutions" # Exploit Author: Arm_Legi (Anonplus) # Website: http://anonplus.tk/ # Date: 29 May 2018 # Vendor : https://www.intercomsolutions.it/it& # Version : Last Version # CVE:N/A Technical Details & Description: ===================================================================================================================== A remote sql-injection web vulnerability has been discovered in a web site developed by https://www.edendesign.it/ The vulnerability allows remote attackers to inject own malicious sql commands to compromise the connected web-server or dbms. ===================================================================================================================== Request Method(s): [+] GET Vulnerable File(s): [+]index.jsp [+]professionista.jsp [+]articolo.jsp Vulnerable Parameter(s): [+]codicePagina [+]idPagina [+]idArticolo ===================================================================================================================== Demo: http://www.gallianisistemi.com/gallianisistemi/index.jsp?codicePagina=CHI%20SIAMO http://www.lam-italia.org/lamitalia/index.jsp?codicePagina=LAM http://www.adagenziadentale.it/adagenziadentale/index.jsp?codicePagina=CONTATTI http://www.castellanisandaniele.it/castellanisandaniele/index.jsp?codicePagina=CONTATTI http://www.scuoladeciani.it/scuoladeciani/index.jsp?codicePagina=servizi


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top