CVE-2017-5963

MEDIUM EXPLOITED

Caddy - XSS

Title source: rule

Description

An issue was discovered in caddy (for TYPO3) before 7.2.10. The vulnerability exists due to insufficient filtration of user-supplied data in the "paymillToken" HTTP POST parameter passed to the "caddy/Resources/Public/JavaScript/e-payment/paymill/api/php/payment.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.

Scores

CVSS v3 6.1
EPSS 0.0023
EPSS Percentile 46.0%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Exploitation Intel

VulnCheck KEV 2022-01-26

Classification

CWE
CWE-79
Status published

Affected Products (23)

caddy_project/caddy
caddy_project/caddy
caddy_project/caddy
caddy_project/caddy
caddy_project/caddy
caddy_project/caddy
caddy_project/caddy
caddy_project/caddy
caddy_project/caddy
caddy_project/caddy
caddy_project/caddy
caddy_project/caddy
caddy_project/caddy
caddy_project/caddy
caddy_project/caddy
... and 8 more

Timeline

Published Feb 12, 2017
Tracked Since Feb 18, 2026