CVE-2017-5963
12.02.2017, 04:59
An issue was discovered in caddy (for TYPO3) before 7.2.10. The vulnerability exists due to insufficient filtration of user-supplied data in the "paymillToken" HTTP POST parameter passed to the "caddy/Resources/Public/JavaScript/e-payment/paymill/api/php/payment.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
Vendor | Product | Version |
---|---|---|
caddy_project | caddy | 2.1.4:alpha |
caddy_project | caddy | 2.1.5:alpha |
caddy_project | caddy | 2.1.6:alpha |
caddy_project | caddy | 3.0.0:alpha |
caddy_project | caddy | 4.0.0:alpha |
caddy_project | caddy | 4.0.1:alpha |
caddy_project | caddy | 4.0.2:alpha |
caddy_project | caddy | 4.0.3:alpha |
caddy_project | caddy | 4.0.12:alpha |
caddy_project | caddy | 6.0.1:alpha |
caddy_project | caddy | 6.0.2:alpha |
caddy_project | caddy | 6.0.9:alpha |
caddy_project | caddy | 6.0.12:beta |
caddy_project | caddy | 6.0.14:beta |
caddy_project | caddy | 6.1.0:beta |
caddy_project | caddy | 6.2.1:beta |
caddy_project | caddy | 6.3.0:beta |
caddy_project | caddy | 6.3.1:beta |
caddy_project | caddy | 6.3.3:beta |
caddy_project | caddy | 7.0.0:beta |
caddy_project | caddy | 7.1.0:beta |
caddy_project | caddy | 7.2.7:beta |
𝑥
= Vulnerable software versions