vendor:
Adicon Server
by:
Kaimi
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Adicon Server
Affected Version From: 1.2
Affected Version To: 1.2
Patch Exists: NO
Related CWE: N/A
CPE: 2.3:a:wordpress:adicons:1.2
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Webapps
2018
WordPress Plugin Adicon Server 1.2 – ‘selectedPlace’ SQL Injection
The vulnerability exists due to insufficient sanitization of user-supplied input in the 'selectedPlace' parameter of the 'addIcon.php' script. A remote attacker can execute arbitrary SQL commands in the application database, cause denial of service, access or modify data, or exploit vulnerabilities in the underlying database. An example payload is 'selectedPlace=1 AND (SELECT * FROM (SELECT(SLEEP(1)))abcD); -- -'
Mitigation:
Input validation should be used to ensure that untrusted data is not used to construct SQL commands that are passed to the database. The application should use parameterized queries, or stored procedures, to ensure that user-supplied data is handled securely.