Found this little gem in my logs today:
A total of 1 possible successful probes were detected (the following URLs
contain strings that match one or more of a listing of strings that
indicate a possible exploit):
/wp-content/plugins/db-backup/download.php?file=/etc/passwd HTTP Response 301
301 is because the request was http, not https. Checked myself, I neither have that plugin installed nor if I did would it work on various different levels for various different reasons.
Question, though: Is it REALLY that common for the www-data user to have read access outside of the web root & config directories? Mine doesn't, but I mean.. Jesus. Allowing www-data read access to /etc/passwd is just asking for trouble.
Edit: /etc/shadow, not /etc/passwd
.. Dunno why /etc/passwd is useful, exactly, aside from username enumeration.
Programming stuffs (tutorials and extras)
PM me (instead of MintPaw) if you're confuzzled.
thank Skaren for the sig :P