Feross Aboukhadijeh 11/17/2011

1% of CMS-Powered Sites Expose Their Database Passwords

Read Original

A security vulnerability in CMS-powered sites (like WordPress, Joomla) exposes database passwords when text editors like Vim or Emacs create backup files (e.g., wp-config.php~). These files are served in plaintext by web servers, allowing unauthorized access. The article details the CMSploit tool used to scan sites, finding 0.77% of CMS sites vulnerable, and explains the technical cause and implications.

1% of CMS-Powered Sites Expose Their Database Passwords

Comments

No comments yet

Be the first to share your thoughts!

Browser Extension

Get instant access to AllDevBlogs from your browser

Top of the Week