Presentation

A SQL exploit is present in eonweb, the injection parameter is user_name. This injection allows to bypass the authentification and so to allow anyone to login without any account.This exploit is possible in the function username_available() in the file includes/functions.php that is called from login.php.

Exploit

EONRCEv3

Impacted Version(s)

EON 5.3-7 EON 5.3-8

Fixed Version(s)

All versions from :

EON 5.3-9

Fix

Download latest EON fixed version.

https://github.com/EyesOfNetworkCommunity/eonweb/issues/76