Get Database Credentials from within the themes file












2














I have a freelancer working on a program for me.



I gave him access to the theme folder via FTP. He uploaded phpMiniAdmin to that folder and, somehow, obtained the database credentials, which he then used to sign in.



How did he manage to obtain those credentials? Is there a vulnerability that can be used once you can upload files to the server?










share|improve this question





























    2














    I have a freelancer working on a program for me.



    I gave him access to the theme folder via FTP. He uploaded phpMiniAdmin to that folder and, somehow, obtained the database credentials, which he then used to sign in.



    How did he manage to obtain those credentials? Is there a vulnerability that can be used once you can upload files to the server?










    share|improve this question



























      2












      2








      2


      1





      I have a freelancer working on a program for me.



      I gave him access to the theme folder via FTP. He uploaded phpMiniAdmin to that folder and, somehow, obtained the database credentials, which he then used to sign in.



      How did he manage to obtain those credentials? Is there a vulnerability that can be used once you can upload files to the server?










      share|improve this question















      I have a freelancer working on a program for me.



      I gave him access to the theme folder via FTP. He uploaded phpMiniAdmin to that folder and, somehow, obtained the database credentials, which he then used to sign in.



      How did he manage to obtain those credentials? Is there a vulnerability that can be used once you can upload files to the server?







      database uploads






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited Dec 31 '18 at 2:39









      That Brazilian Guy

      4451727




      4451727










      asked Dec 30 '18 at 14:34









      Dan W.Dan W.

      112




      112






















          2 Answers
          2






          active

          oldest

          votes


















          6














          All he needed to do is to put this PHP code in any template file and run it:



          var_dump(DB_NAME, DB_USER, DB_PASSWORD, DB_HOST);


          One line and it will print all the DB credentials.



          As you can see - no vulnerabilities are needed.



          All PHP code has access to these credentials. And it has to - otherwise it wouldn’t be able to access DB...






          share|improve this answer





























            3














            If they can upload files then they can upload a php file that can read the database credentials from wp-config.php. Having upload access to the server can let you do almost anything. Don't give that access to people you don't trust. There's no vulnerability here, you just gave them the keys.






            share|improve this answer























              Your Answer








              StackExchange.ready(function() {
              var channelOptions = {
              tags: "".split(" "),
              id: "110"
              };
              initTagRenderer("".split(" "), "".split(" "), channelOptions);

              StackExchange.using("externalEditor", function() {
              // Have to fire editor after snippets, if snippets enabled
              if (StackExchange.settings.snippets.snippetsEnabled) {
              StackExchange.using("snippets", function() {
              createEditor();
              });
              }
              else {
              createEditor();
              }
              });

              function createEditor() {
              StackExchange.prepareEditor({
              heartbeatType: 'answer',
              autoActivateHeartbeat: false,
              convertImagesToLinks: false,
              noModals: true,
              showLowRepImageUploadWarning: true,
              reputationToPostImages: null,
              bindNavPrevention: true,
              postfix: "",
              imageUploader: {
              brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
              contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
              allowUrls: true
              },
              onDemand: true,
              discardSelector: ".discard-answer"
              ,immediatelyShowMarkdownHelp:true
              });


              }
              });














              draft saved

              draft discarded


















              StackExchange.ready(
              function () {
              StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fwordpress.stackexchange.com%2fquestions%2f324230%2fget-database-credentials-from-within-the-themes-file%23new-answer', 'question_page');
              }
              );

              Post as a guest















              Required, but never shown

























              2 Answers
              2






              active

              oldest

              votes








              2 Answers
              2






              active

              oldest

              votes









              active

              oldest

              votes






              active

              oldest

              votes









              6














              All he needed to do is to put this PHP code in any template file and run it:



              var_dump(DB_NAME, DB_USER, DB_PASSWORD, DB_HOST);


              One line and it will print all the DB credentials.



              As you can see - no vulnerabilities are needed.



              All PHP code has access to these credentials. And it has to - otherwise it wouldn’t be able to access DB...






              share|improve this answer


























                6














                All he needed to do is to put this PHP code in any template file and run it:



                var_dump(DB_NAME, DB_USER, DB_PASSWORD, DB_HOST);


                One line and it will print all the DB credentials.



                As you can see - no vulnerabilities are needed.



                All PHP code has access to these credentials. And it has to - otherwise it wouldn’t be able to access DB...






                share|improve this answer
























                  6












                  6








                  6






                  All he needed to do is to put this PHP code in any template file and run it:



                  var_dump(DB_NAME, DB_USER, DB_PASSWORD, DB_HOST);


                  One line and it will print all the DB credentials.



                  As you can see - no vulnerabilities are needed.



                  All PHP code has access to these credentials. And it has to - otherwise it wouldn’t be able to access DB...






                  share|improve this answer












                  All he needed to do is to put this PHP code in any template file and run it:



                  var_dump(DB_NAME, DB_USER, DB_PASSWORD, DB_HOST);


                  One line and it will print all the DB credentials.



                  As you can see - no vulnerabilities are needed.



                  All PHP code has access to these credentials. And it has to - otherwise it wouldn’t be able to access DB...







                  share|improve this answer












                  share|improve this answer



                  share|improve this answer










                  answered Dec 30 '18 at 15:09









                  Krzysiek DróżdżKrzysiek Dróżdż

                  14k52741




                  14k52741

























                      3














                      If they can upload files then they can upload a php file that can read the database credentials from wp-config.php. Having upload access to the server can let you do almost anything. Don't give that access to people you don't trust. There's no vulnerability here, you just gave them the keys.






                      share|improve this answer




























                        3














                        If they can upload files then they can upload a php file that can read the database credentials from wp-config.php. Having upload access to the server can let you do almost anything. Don't give that access to people you don't trust. There's no vulnerability here, you just gave them the keys.






                        share|improve this answer


























                          3












                          3








                          3






                          If they can upload files then they can upload a php file that can read the database credentials from wp-config.php. Having upload access to the server can let you do almost anything. Don't give that access to people you don't trust. There's no vulnerability here, you just gave them the keys.






                          share|improve this answer














                          If they can upload files then they can upload a php file that can read the database credentials from wp-config.php. Having upload access to the server can let you do almost anything. Don't give that access to people you don't trust. There's no vulnerability here, you just gave them the keys.







                          share|improve this answer














                          share|improve this answer



                          share|improve this answer








                          edited Dec 30 '18 at 15:12

























                          answered Dec 30 '18 at 14:38









                          Jacob PeattieJacob Peattie

                          15.3k41927




                          15.3k41927






























                              draft saved

                              draft discarded




















































                              Thanks for contributing an answer to WordPress Development Stack Exchange!


                              • Please be sure to answer the question. Provide details and share your research!

                              But avoid



                              • Asking for help, clarification, or responding to other answers.

                              • Making statements based on opinion; back them up with references or personal experience.


                              To learn more, see our tips on writing great answers.





                              Some of your past answers have not been well-received, and you're in danger of being blocked from answering.


                              Please pay close attention to the following guidance:


                              • Please be sure to answer the question. Provide details and share your research!

                              But avoid



                              • Asking for help, clarification, or responding to other answers.

                              • Making statements based on opinion; back them up with references or personal experience.


                              To learn more, see our tips on writing great answers.




                              draft saved


                              draft discarded














                              StackExchange.ready(
                              function () {
                              StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fwordpress.stackexchange.com%2fquestions%2f324230%2fget-database-credentials-from-within-the-themes-file%23new-answer', 'question_page');
                              }
                              );

                              Post as a guest















                              Required, but never shown





















































                              Required, but never shown














                              Required, but never shown












                              Required, but never shown







                              Required, but never shown

































                              Required, but never shown














                              Required, but never shown












                              Required, but never shown







                              Required, but never shown







                              Popular posts from this blog

                              Biblatex bibliography style without URLs when DOI exists (in Overleaf with Zotero bibliography)

                              ComboBox Display Member on multiple fields

                              Is it possible to collect Nectar points via Trainline?