GetSimple CMS Administrative Credentials Disclosure Vulnerability

Summary
This host is running GetSimple CMS and is prone to administrative credentials disclosure vulnerability.
Impact
Successful exploitation will allow remote attackers to obtain sensitive information. Impact Level: Application.
Solution
Apply the patch or upagrade to GetSimple CMS 2.03 or later, For updates refer to http://get-simple.info/download/
Insight
GetSimple does not use a SQL Database. Instead it uses a '.xml' files located at '/GetSimple/data'. The administrators username and password hash can be obtained by navigating to the '/data/other/user.xml' xml file.
Affected
GetSimple CMS 2.01 and 2.02
References