Summary
This host is running GetSimple CMS and is prone to administrative credentials disclosure vulnerability.
Impact
Successful exploitation will allow remote attackers to obtain sensitive information.
Impact Level: Application.
Solution
Apply the patch or upagrade to GetSimple CMS 2.03 or later, For updates refer to http://get-simple.info/download/
Insight
GetSimple does not use a SQL Database. Instead it uses a '.xml' files located at '/GetSimple/data'. The administrators username and password hash can be obtained by navigating to the '/data/other/user.xml' xml file.
Affected
GetSimple CMS 2.01 and 2.02
References
Updated on 2015-03-25