CVE-2017-5963
MEDIUM EXPLOITEDCaddy - XSS
Title source: ruleDescription
An issue was discovered in caddy (for TYPO3) before 7.2.10. The vulnerability exists due to insufficient filtration of user-supplied data in the "paymillToken" HTTP POST parameter passed to the "caddy/Resources/Public/JavaScript/e-payment/paymill/api/php/payment.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
Scores
CVSS v3
6.1
EPSS
0.0023
EPSS Percentile
46.0%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Exploitation Intel
VulnCheck KEV
2022-01-26
Classification
CWE
CWE-79
Status
published
Affected Products (23)
caddy_project/caddy
caddy_project/caddy
caddy_project/caddy
caddy_project/caddy
caddy_project/caddy
caddy_project/caddy
caddy_project/caddy
caddy_project/caddy
caddy_project/caddy
caddy_project/caddy
caddy_project/caddy
caddy_project/caddy
caddy_project/caddy
caddy_project/caddy
caddy_project/caddy
... and 8 more
Timeline
Published
Feb 12, 2017
Tracked Since
Feb 18, 2026