Miggo Logo

CVE-2017-6099:
PayPal PHP Merchant SDK Cross-site scripting (XSS) vulnerability

6.1

CVSS Score
3.0

Basic Information

EPSS Score
0.46093%
Published
5/14/2022
Updated
4/25/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
paypal/merchant-sdk-phpcomposer>= 3.0.0, < 3.12.03.12.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability manifests in GetAuthDetails.html.php where the 'token' parameter is retrieved from user input ($_GET) and directly output in HTML context without proper sanitization. The GitHub issue #129 explicitly shows the vulnerable pattern: user-controlled token parameter is embedded in page output without escaping, creating a classic reflected XSS vulnerability. While no named functions are referenced, the inline PHP code handling parameter output constitutes the vulnerable code path.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*ross-sit* s*riptin* (XSS) vuln*r**ility in **t*ut***t*ils.*tml.p*p in P*yP*l P*P M*r***nt S*K (*k* m*r***nt-s*k-p*p) *.*.* *llows r*mot* *tt**k*rs to inj**t *r*itr*ry w** s*ript or *TML vi* t** tok*n p*r*m*t*r.

Reasoning

T** vuln*r**ility m*ni**sts in `**t*ut***t*ils.*tml.p*p` w**r* t** 'tok*n' p*r*m*t*r is r*tri*v** *rom us*r input (`$_**T`) *n* *ir**tly output in *TML *ont*xt wit*out prop*r s*nitiz*tion. T** *it*u* issu* #*** *xpli*itly s*ows t** vuln*r**l* p*tt*rn