An issue exists in caddy (for TYPO3) prior to 7.2.10. The vulnerability exists due to insufficient filtration of user-supplied data in the "paymillToken" HTTP POST parameter passed to the "caddy/Resources/Public/JavaScript/e-payment/paymill/api/php/payment.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
caddy project caddy 2.1.4 |
||
caddy project caddy 4.0.1 |
||
caddy project caddy 4.0.3 |
||
caddy project caddy 6.0.1 |
||
caddy project caddy 6.1.0 |
||
caddy project caddy 6.3.0 |
||
caddy project caddy 6.0.2 |
||
caddy project caddy 6.0.9 |
||
caddy project caddy 6.0.12 |
||
caddy project caddy 6.0.14 |
||
caddy project caddy 2.1.5 |
||
caddy project caddy 2.1.6 |
||
caddy project caddy 3.0.0 |
||
caddy project caddy 4.0.0 |
||
caddy project caddy 6.3.3 |
||
caddy project caddy 7.0.0 |
||
caddy project caddy 7.1.0 |
||
caddy project caddy 7.2.7 |
||
caddy project caddy 4.0.2 |
||
caddy project caddy 4.0.12 |
||
caddy project caddy 6.2.1 |
||
caddy project caddy 6.3.1 |