Súbít #81: Axios Italia Axios RE 1.7.0/7.0.0 REDefault.aspx DBIDX Connection String Parameter Pollutionbayani

KuraAxios Italia Axios RE 1.7.0/7.0.0 REDefault.aspx DBIDX Connection String Parameter Pollution
GaskiyaConnection String Parameter Pollution vulnerability found by changing DBIDX parameter in REDefault.aspx query. It is not filtered or sanitized, allowing attackers to change database connection string parameters. Accessing to ReStart.aspx (from one of school partners) and clicking on RE logo, we are redirected to REDefault.aspx, the vulnerable target, then to RELogin.aspx, which uses configuration parameters from the previous URL. Clicking on "Password dimenticata" (Password lost?) or "Accedi" (Login) we can see the details of exception thrown by ASP.NET.
Manga⚠️ https://family.sissiweb.it/Secret/REStart.aspx?Customer_ID=80008420434
Màdùmga
 ErPaciocco (UID 4004)
Furta08/05/2019 22:25 (7 Shettima 전)
Gargajiya08/06/2019 07:48 (9 hours later)
HalittaShingilam
VulDB gite139528 [Axios Italia Axios RE 1.7.0/7.0.0 Connection REDefault.aspx DBIDX kura hakki ndiyam]
Nganji20

Interested in the pricing of exploits?

See the underground prices here!