Get Database Credentials from within the themes file












1














I have a freelancer working on a program for me. I gave him access to the themes file via FTP. He uploaded phpminiadmin to that file and somehow he got the database credentials to sign in. Does anyone know how he did it? Is there a vulnerability that can be used once you can upload to the server?










share|improve this question







New contributor




Dan W. is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.

























    1














    I have a freelancer working on a program for me. I gave him access to the themes file via FTP. He uploaded phpminiadmin to that file and somehow he got the database credentials to sign in. Does anyone know how he did it? Is there a vulnerability that can be used once you can upload to the server?










    share|improve this question







    New contributor




    Dan W. is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
    Check out our Code of Conduct.























      1












      1








      1







      I have a freelancer working on a program for me. I gave him access to the themes file via FTP. He uploaded phpminiadmin to that file and somehow he got the database credentials to sign in. Does anyone know how he did it? Is there a vulnerability that can be used once you can upload to the server?










      share|improve this question







      New contributor




      Dan W. is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.











      I have a freelancer working on a program for me. I gave him access to the themes file via FTP. He uploaded phpminiadmin to that file and somehow he got the database credentials to sign in. Does anyone know how he did it? Is there a vulnerability that can be used once you can upload to the server?







      database uploads






      share|improve this question







      New contributor




      Dan W. is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.











      share|improve this question







      New contributor




      Dan W. is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.









      share|improve this question




      share|improve this question






      New contributor




      Dan W. is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.









      asked 1 hour ago









      Dan W.

      62




      62




      New contributor




      Dan W. is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.





      New contributor





      Dan W. is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.






      Dan W. is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
      Check out our Code of Conduct.






















          2 Answers
          2






          active

          oldest

          votes


















          2














          All he needed to do is to put this PHP code in any template file and run it:



          var_dump(DB_NAME, DB_USER, DB_PASSWORD, DB_HOST);


          One line and it will print all the DB credentials.



          As you can see - no vulnerabilities are needed.



          All PHP code has access to these credentials. And it has to - otherwise it wouldn’t be able to access DB...






          share|improve this answer





























            1














            If they can upload files then they can upload a php file that can read the database credentials from wp-config.php. Having upload access to the server can let you do almost anything. Don't give that access to people you don't trust. There's no vulnerability here, you just gave them the keys.






            share|improve this answer























              Your Answer








              StackExchange.ready(function() {
              var channelOptions = {
              tags: "".split(" "),
              id: "110"
              };
              initTagRenderer("".split(" "), "".split(" "), channelOptions);

              StackExchange.using("externalEditor", function() {
              // Have to fire editor after snippets, if snippets enabled
              if (StackExchange.settings.snippets.snippetsEnabled) {
              StackExchange.using("snippets", function() {
              createEditor();
              });
              }
              else {
              createEditor();
              }
              });

              function createEditor() {
              StackExchange.prepareEditor({
              heartbeatType: 'answer',
              autoActivateHeartbeat: false,
              convertImagesToLinks: false,
              noModals: true,
              showLowRepImageUploadWarning: true,
              reputationToPostImages: null,
              bindNavPrevention: true,
              postfix: "",
              imageUploader: {
              brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
              contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
              allowUrls: true
              },
              onDemand: true,
              discardSelector: ".discard-answer"
              ,immediatelyShowMarkdownHelp:true
              });


              }
              });






              Dan W. is a new contributor. Be nice, and check out our Code of Conduct.










              draft saved

              draft discarded


















              StackExchange.ready(
              function () {
              StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fwordpress.stackexchange.com%2fquestions%2f324230%2fget-database-credentials-from-within-the-themes-file%23new-answer', 'question_page');
              }
              );

              Post as a guest















              Required, but never shown

























              2 Answers
              2






              active

              oldest

              votes








              2 Answers
              2






              active

              oldest

              votes









              active

              oldest

              votes






              active

              oldest

              votes









              2














              All he needed to do is to put this PHP code in any template file and run it:



              var_dump(DB_NAME, DB_USER, DB_PASSWORD, DB_HOST);


              One line and it will print all the DB credentials.



              As you can see - no vulnerabilities are needed.



              All PHP code has access to these credentials. And it has to - otherwise it wouldn’t be able to access DB...






              share|improve this answer


























                2














                All he needed to do is to put this PHP code in any template file and run it:



                var_dump(DB_NAME, DB_USER, DB_PASSWORD, DB_HOST);


                One line and it will print all the DB credentials.



                As you can see - no vulnerabilities are needed.



                All PHP code has access to these credentials. And it has to - otherwise it wouldn’t be able to access DB...






                share|improve this answer
























                  2












                  2








                  2






                  All he needed to do is to put this PHP code in any template file and run it:



                  var_dump(DB_NAME, DB_USER, DB_PASSWORD, DB_HOST);


                  One line and it will print all the DB credentials.



                  As you can see - no vulnerabilities are needed.



                  All PHP code has access to these credentials. And it has to - otherwise it wouldn’t be able to access DB...






                  share|improve this answer












                  All he needed to do is to put this PHP code in any template file and run it:



                  var_dump(DB_NAME, DB_USER, DB_PASSWORD, DB_HOST);


                  One line and it will print all the DB credentials.



                  As you can see - no vulnerabilities are needed.



                  All PHP code has access to these credentials. And it has to - otherwise it wouldn’t be able to access DB...







                  share|improve this answer












                  share|improve this answer



                  share|improve this answer










                  answered 1 hour ago









                  Krzysiek Dróżdż

                  13.6k52741




                  13.6k52741

























                      1














                      If they can upload files then they can upload a php file that can read the database credentials from wp-config.php. Having upload access to the server can let you do almost anything. Don't give that access to people you don't trust. There's no vulnerability here, you just gave them the keys.






                      share|improve this answer




























                        1














                        If they can upload files then they can upload a php file that can read the database credentials from wp-config.php. Having upload access to the server can let you do almost anything. Don't give that access to people you don't trust. There's no vulnerability here, you just gave them the keys.






                        share|improve this answer


























                          1












                          1








                          1






                          If they can upload files then they can upload a php file that can read the database credentials from wp-config.php. Having upload access to the server can let you do almost anything. Don't give that access to people you don't trust. There's no vulnerability here, you just gave them the keys.






                          share|improve this answer














                          If they can upload files then they can upload a php file that can read the database credentials from wp-config.php. Having upload access to the server can let you do almost anything. Don't give that access to people you don't trust. There's no vulnerability here, you just gave them the keys.







                          share|improve this answer














                          share|improve this answer



                          share|improve this answer








                          edited 1 hour ago

























                          answered 1 hour ago









                          Jacob Peattie

                          15.2k41826




                          15.2k41826






















                              Dan W. is a new contributor. Be nice, and check out our Code of Conduct.










                              draft saved

                              draft discarded


















                              Dan W. is a new contributor. Be nice, and check out our Code of Conduct.













                              Dan W. is a new contributor. Be nice, and check out our Code of Conduct.












                              Dan W. is a new contributor. Be nice, and check out our Code of Conduct.
















                              Thanks for contributing an answer to WordPress Development Stack Exchange!


                              • Please be sure to answer the question. Provide details and share your research!

                              But avoid



                              • Asking for help, clarification, or responding to other answers.

                              • Making statements based on opinion; back them up with references or personal experience.


                              To learn more, see our tips on writing great answers.





                              Some of your past answers have not been well-received, and you're in danger of being blocked from answering.


                              Please pay close attention to the following guidance:


                              • Please be sure to answer the question. Provide details and share your research!

                              But avoid



                              • Asking for help, clarification, or responding to other answers.

                              • Making statements based on opinion; back them up with references or personal experience.


                              To learn more, see our tips on writing great answers.




                              draft saved


                              draft discarded














                              StackExchange.ready(
                              function () {
                              StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fwordpress.stackexchange.com%2fquestions%2f324230%2fget-database-credentials-from-within-the-themes-file%23new-answer', 'question_page');
                              }
                              );

                              Post as a guest















                              Required, but never shown





















































                              Required, but never shown














                              Required, but never shown












                              Required, but never shown







                              Required, but never shown

































                              Required, but never shown














                              Required, but never shown












                              Required, but never shown







                              Required, but never shown







                              Popular posts from this blog

                              Le Mesnil-Réaume

                              Ida-Boy-Ed-Garten

                              web3.py web3.isConnected() returns false always