2.6
CVSSv2

CVE-2007-1358

Published: 10/05/2007 Updated: 07/11/2023
CVSS v2 Base Score: 2.6 | Impact Score: 2.9 | Exploitability Score: 4.9
VMScore: 231
Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N

Vulnerability Summary

Cross-site scripting (XSS) vulnerability in certain applications using Apache Tomcat 4.0.0 up to and including 4.0.6 and 4.1.0 up to and including 4.1.34 allows remote malicious users to inject arbitrary web script or HTML via crafted "Accept-Language headers that do not conform to RFC 2616".

Vulnerable Product Search on Vulmon Subscribe to Product

apache tomcat 4.0.4

apache tomcat 4.0.6

apache tomcat 4.0.3

apache tomcat 4.0.1

apache tomcat 4.1.0

apache tomcat 4.0.2

apache tomcat 4.0.5

apache tomcat 4.0.0

apache tomcat

References

CWE-79http://tomcat.apache.org/security-4.htmlhttp://jvn.jp/jp/JVN%2316535199/index.htmlhttp://www.fujitsu.com/global/support/software/security/products-f/interstage-200704e.htmlhttp://lists.apple.com/archives/security-announce//2007/Jul/msg00004.htmlhttps://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.htmlhttp://www.securityfocus.com/bid/24524http://www.securityfocus.com/bid/25159http://www.securitytracker.com/id?1018269http://secunia.com/advisories/25721http://secunia.com/advisories/26235http://secunia.com/advisories/26660http://secunia.com/advisories/27037http://secunia.com/advisories/27727http://www.redhat.com/support/errata/RHSA-2008-0261.htmlhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1http://secunia.com/advisories/30908http://secunia.com/advisories/30899http://rhn.redhat.com/errata/RHSA-2008-0630.htmlhttp://secunia.com/advisories/31493http://secunia.com/advisories/33668http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspxhttp://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795http://www.vupen.com/english/advisories/2009/0233http://www.vupen.com/english/advisories/2007/3087http://www.vupen.com/english/advisories/2007/2732http://www.vupen.com/english/advisories/2007/3386http://www.vupen.com/english/advisories/2008/1979/referenceshttp://www.vupen.com/english/advisories/2007/1729http://osvdb.org/34881http://docs.info.apple.com/article.html?artnum=306172https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10679http://www.securityfocus.com/archive/1/500412/100/0/threadedhttp://www.securityfocus.com/archive/1/500396/100/0/threadedhttp://www.securityfocus.com/archive/1/471719/100/0/threadedhttps://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3Ehttps://nvd.nist.gov