3.5
CVSSv2

CVE-2007-2450

Published: 14/06/2007 Updated: 07/11/2023
CVSS v2 Base Score: 3.5 | Impact Score: 2.9 | Exploitability Score: 6.8
VMScore: 312
Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N

Vulnerability Summary

Multiple cross-site scripting (XSS) vulnerabilities in the (1) Manager and (2) Host Manager web applications in Apache Tomcat 4.0.0 up to and including 4.0.6, 4.1.0 up to and including 4.1.36, 5.0.0 up to and including 5.0.30, 5.5.0 up to and including 5.5.24, and 6.0.0 up to and including 6.0.13 allow remote authenticated users to inject arbitrary web script or HTML via a parameter name to manager/html/upload, and other unspecified vectors.

Vulnerable Product Search on Vulmon Subscribe to Product

apache tomcat 4.1.2

apache tomcat 4.0.4

apache tomcat 4.1.36

apache tomcat 4.1.9

apache tomcat 5.5.18

apache tomcat 5.0.8

apache tomcat 5.0.19

apache tomcat 6.0.6

apache tomcat 6.0.11

apache tomcat 5.5.12

apache tomcat 5.0.14

apache tomcat 5.5.14

apache tomcat 4.1.24

apache tomcat 5.5.10

apache tomcat 5.0.22

apache tomcat 5.5.4

apache tomcat 5.5.7

apache tomcat 5.5.1

apache tomcat 5.0.7

apache tomcat 6.0.7

apache tomcat 5.5.11

apache tomcat 6.0.4

apache tomcat 5.5.6

apache tomcat 5.0.9

apache tomcat 5.0.15

apache tomcat 5.0.30

apache tomcat 5.5.20

apache tomcat 5.5.15

apache tomcat 5.0.23

apache tomcat 5.0.2

apache tomcat 5.5.5

apache tomcat 5.0.10

apache tomcat 5.0.21

apache tomcat 5.0.26

apache tomcat 5.5.21

apache tomcat 5.5.22

apache tomcat 6.0.10

apache tomcat 6.0.3

apache tomcat 5.0.0

apache tomcat 5.0.6

apache tomcat 6.0.9

apache tomcat 4.1.31

apache tomcat 5.5.3

apache tomcat 5.0.27

apache tomcat 5.0.16

apache tomcat 4.0.6

apache tomcat 5.5.9

apache tomcat 4.0.3

apache tomcat 5.0.18

apache tomcat 6.0.0

apache tomcat 4.0.1

apache tomcat 5.5.2

apache tomcat 5.0.5

apache tomcat 5.0.28

apache tomcat 5.0.29

apache tomcat 5.5.0

apache tomcat 4.1.1

apache tomcat 5.5.13

apache tomcat 6.0.1

apache tomcat 6.0.12

apache tomcat 5.5.24

apache tomcat 4.1.28

apache tomcat 5.0.13

apache tomcat 4.1.15

apache tomcat 4.1.3

apache tomcat 4.1.10

apache tomcat 5.5.8

apache tomcat 5.0.17

apache tomcat 5.5.16

apache tomcat 4.1.0

apache tomcat 6.0.5

apache tomcat 4.0.2

apache tomcat 5.5.17

apache tomcat 5.5.19

apache tomcat 4.0.5

apache tomcat 4.0.0

apache tomcat 5.0.4

apache tomcat 6.0.2

apache tomcat 5.0.25

apache tomcat 6.0.13

apache tomcat 5.0.1

apache tomcat 5.0.11

apache tomcat 5.5.23

apache tomcat 5.0.3

apache tomcat 5.0.24

apache tomcat 6.0.8

apache tomcat 5.0.12

References

CWE-79http://tomcat.apache.org/security-6.htmlhttp://jvn.jp/jp/JVN%2307100457/index.htmlhttp://tomcat.apache.org/security-4.htmlhttp://tomcat.apache.org/security-5.htmlhttps://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0569.htmlhttp://www.securityfocus.com/bid/24475http://www.osvdb.org/36079http://www.securitytracker.com/id?1018245http://secunia.com/advisories/25678http://secunia.com/advisories/26076http://secunia.com/advisories/27037http://secunia.com/advisories/27727http://securityreason.com/securityalert/2813http://www.mandriva.com/security/advisories?name=MDKSA-2007:241http://www.debian.org/security/2008/dsa-1468http://secunia.com/advisories/28549http://www.redhat.com/support/errata/RHSA-2008-0261.htmlhttp://support.apple.com/kb/HT2163http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.htmlhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1http://secunia.com/advisories/30802http://secunia.com/advisories/30908http://secunia.com/advisories/30899http://secunia.com/advisories/33668http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspxhttp://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.htmlhttp://www.vupen.com/english/advisories/2009/0233http://www.vupen.com/english/advisories/2007/2213http://www.vupen.com/english/advisories/2007/3386http://www.vupen.com/english/advisories/2008/1979/referenceshttp://www.vupen.com/english/advisories/2008/1981/referenceshttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795https://exchange.xforce.ibmcloud.com/vulnerabilities/34868https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11287http://www.securityfocus.com/archive/1/500412/100/0/threadedhttp://www.securityfocus.com/archive/1/500396/100/0/threadedhttp://www.securityfocus.com/archive/1/471357/100/0/threadedhttps://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3Ehttps://nvd.nist.gov