# Exploit Title: Intercom Solutions developer website SQLi
# dork : Google: inurl:index.jsp? intext:"sviluppato da intercom solutions" Bing: index.jsp?= "Sviluppato da Intercom Solutions"
# Exploit Author: Arm_Legi (Anonplus)
# Website: http://anonplus.tk/
# Date: 29 May 2018
# Vendor : https://www.intercomsolutions.it/it&
# Version : Last Version
# CVE:N/A
Technical Details & Description:
=====================================================================================================================
A remote sql-injection web vulnerability has been discovered in a web site developed by https://www.edendesign.it/
The vulnerability allows remote attackers to inject own malicious sql commands to compromise the connected web-server or dbms.
=====================================================================================================================
Request Method(s):
[+] GET
Vulnerable File(s):
[+]index.jsp
[+]professionista.jsp
[+]articolo.jsp
Vulnerable Parameter(s):
[+]codicePagina
[+]idPagina
[+]idArticolo
=====================================================================================================================
Demo:
http://www.gallianisistemi.com/gallianisistemi/index.jsp?codicePagina=CHI%20SIAMO
http://www.lam-italia.org/lamitalia/index.jsp?codicePagina=LAM
http://www.adagenziadentale.it/adagenziadentale/index.jsp?codicePagina=CONTATTI
http://www.castellanisandaniele.it/castellanisandaniele/index.jsp?codicePagina=CONTATTI
http://www.scuoladeciani.it/scuoladeciani/index.jsp?codicePagina=servizi