Metaping SQL Injection

2018.07.01
ch Arm_Legi (CH) ch
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-89

# Exploit Title: Metaping SQLi # dork : "site by metaping" custom.asp?id= # Exploit Author: Arm_Legi (Anonplus, http://anonplus.ezyro.com/) # Date: 1 July 2018 # Vendor : https://www.metaping.it/ # Version : N/A # CVE: N/A # Dbms : MSSQL Technical Details & Description: =============================================================================================================================================== A remote sql-injection web vulnerability has been discovered in a web app of https://www.metaping.it/ The vulnerability allows remote attackers to inject own malicious sql commands to compromise the connected web-server or dbms. The vendor host all the website that they do in the same server! They host their own subdomain in the same server too : http://web.metaping.it/adm2.asp =============================================================================================================================================== Request Method(s): [+] GET Vulnerable File(s): [+] custom.asp Vulnerable Parameter(s): [+] id ================================================================================================================================================================================================================================= ================================================================================================================================================================================================================================== The subdomain is Vuln: http://web.metaping.it/adm2.asp Type: '=' 'or' in : username , password and codice sito ! you will get and SQL error ! that's mean that u can extract the data with burpsuite or tampr data and perform an sql injection with post method ! data: username=%27%3D%27+%27or%27&password=%27%3D%27+%27or%27&scod=%27%3D%27+%27or%27&area=3&Submit=entra Request Method(s): [+] POST Vulnerable File(s): [+] adm2.asp Vulnerable Parameter(s): [+] username [+] scod


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2018, cxsecurity.com

 

Back to Top