CVE-2017-5963
An issue was discovered in caddy (for TYPO3) before 7.2.10. The vulnerability exists due to insufficient filtration of user-supplied data in the "paymillToken" HTTP POST parameter passed to the "caddy/Resources/Public/JavaScript/e-payment/paymill/api/php/payment.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
Cross-site Scripting
Vendor | Product | Version |
---|---|---|
caddy_project | caddy | 2.1.4 |
caddy_project | caddy | 2.1.5 |
caddy_project | caddy | 2.1.6 |
caddy_project | caddy | 3.0.0 |
caddy_project | caddy | 4.0.0 |
caddy_project | caddy | 4.0.1 |
caddy_project | caddy | 4.0.2 |
caddy_project | caddy | 4.0.3 |
caddy_project | caddy | 4.0.12 |
caddy_project | caddy | 6.0.1 |
caddy_project | caddy | 6.0.2 |
caddy_project | caddy | 6.0.9 |
caddy_project | caddy | 6.0.12 |
caddy_project | caddy | 6.0.14 |
caddy_project | caddy | 6.1.0 |
caddy_project | caddy | 6.2.1 |
caddy_project | caddy | 6.3.0 |
caddy_project | caddy | 6.3.1 |
caddy_project | caddy | 6.3.3 |
caddy_project | caddy | 7.0.0 |
caddy_project | caddy | 7.1.0 |
caddy_project | caddy | 7.2.7 |
Common Weakness Enumeration