CVE-2007-2450

Multiple cross-site scripting (XSS) vulnerabilities in the (1) Manager and (2) Host Manager web applications in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote authenticated users to inject arbitrary web script or HTML via a parameter name to manager/html/upload, and other unspecified vectors.
References
Link Resource
http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
http://jvn.jp/jp/JVN%2307100457/index.html
http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
http://secunia.com/advisories/25678 Vendor Advisory
http://secunia.com/advisories/26076 Vendor Advisory
http://secunia.com/advisories/27037 Vendor Advisory
http://secunia.com/advisories/27727 Vendor Advisory
http://secunia.com/advisories/28549 Vendor Advisory
http://secunia.com/advisories/30802 Vendor Advisory
http://secunia.com/advisories/30899 Vendor Advisory
http://secunia.com/advisories/30908 Vendor Advisory
http://secunia.com/advisories/33668 Vendor Advisory
http://securityreason.com/securityalert/2813
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1
http://support.apple.com/kb/HT2163
http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540
http://tomcat.apache.org/security-4.html Patch Vendor Advisory
http://tomcat.apache.org/security-5.html Patch Vendor Advisory
http://tomcat.apache.org/security-6.html Patch Vendor Advisory
http://www.debian.org/security/2008/dsa-1468
http://www.mandriva.com/security/advisories?name=MDKSA-2007:241
http://www.osvdb.org/36079
http://www.redhat.com/support/errata/RHSA-2007-0569.html
http://www.redhat.com/support/errata/RHSA-2008-0261.html
http://www.securityfocus.com/archive/1/471357/100/0/threaded
http://www.securityfocus.com/archive/1/500396/100/0/threaded
http://www.securityfocus.com/archive/1/500412/100/0/threaded
http://www.securityfocus.com/bid/24475
http://www.securitytracker.com/id?1018245
http://www.vupen.com/english/advisories/2007/2213
http://www.vupen.com/english/advisories/2007/3386
http://www.vupen.com/english/advisories/2008/1979/references
http://www.vupen.com/english/advisories/2008/1981/references
http://www.vupen.com/english/advisories/2009/0233
https://exchange.xforce.ibmcloud.com/vulnerabilities/34868
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11287
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html
http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
http://jvn.jp/jp/JVN%2307100457/index.html
http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
http://secunia.com/advisories/25678 Vendor Advisory
http://secunia.com/advisories/26076 Vendor Advisory
http://secunia.com/advisories/27037 Vendor Advisory
http://secunia.com/advisories/27727 Vendor Advisory
http://secunia.com/advisories/28549 Vendor Advisory
http://secunia.com/advisories/30802 Vendor Advisory
http://secunia.com/advisories/30899 Vendor Advisory
http://secunia.com/advisories/30908 Vendor Advisory
http://secunia.com/advisories/33668 Vendor Advisory
http://securityreason.com/securityalert/2813
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1
http://support.apple.com/kb/HT2163
http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540
http://tomcat.apache.org/security-4.html Patch Vendor Advisory
http://tomcat.apache.org/security-5.html Patch Vendor Advisory
http://tomcat.apache.org/security-6.html Patch Vendor Advisory
http://www.debian.org/security/2008/dsa-1468
http://www.mandriva.com/security/advisories?name=MDKSA-2007:241
http://www.osvdb.org/36079
http://www.redhat.com/support/errata/RHSA-2007-0569.html
http://www.redhat.com/support/errata/RHSA-2008-0261.html
http://www.securityfocus.com/archive/1/471357/100/0/threaded
http://www.securityfocus.com/archive/1/500396/100/0/threaded
http://www.securityfocus.com/archive/1/500412/100/0/threaded
http://www.securityfocus.com/bid/24475
http://www.securitytracker.com/id?1018245
http://www.vupen.com/english/advisories/2007/2213
http://www.vupen.com/english/advisories/2007/3386
http://www.vupen.com/english/advisories/2008/1979/references
http://www.vupen.com/english/advisories/2008/1981/references
http://www.vupen.com/english/advisories/2009/0233
https://exchange.xforce.ibmcloud.com/vulnerabilities/34868
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11287
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:tomcat:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.0.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.9:beta:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.18:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.19:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.21:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.22:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.23:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.24:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.25:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.26:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.27:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.28:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.29:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.30:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*

History

21 Nov 2024, 00:30

Type Values Removed Values Added
References () http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx - () http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx -
References () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795 - () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795 -
References () http://jvn.jp/jp/JVN%2307100457/index.html - () http://jvn.jp/jp/JVN%2307100457/index.html -
References () http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html - () http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html -
References () http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html - () http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html -
References () http://secunia.com/advisories/25678 - Vendor Advisory () http://secunia.com/advisories/25678 - Vendor Advisory
References () http://secunia.com/advisories/26076 - Vendor Advisory () http://secunia.com/advisories/26076 - Vendor Advisory
References () http://secunia.com/advisories/27037 - Vendor Advisory () http://secunia.com/advisories/27037 - Vendor Advisory
References () http://secunia.com/advisories/27727 - Vendor Advisory () http://secunia.com/advisories/27727 - Vendor Advisory
References () http://secunia.com/advisories/28549 - Vendor Advisory () http://secunia.com/advisories/28549 - Vendor Advisory
References () http://secunia.com/advisories/30802 - Vendor Advisory () http://secunia.com/advisories/30802 - Vendor Advisory
References () http://secunia.com/advisories/30899 - Vendor Advisory () http://secunia.com/advisories/30899 - Vendor Advisory
References () http://secunia.com/advisories/30908 - Vendor Advisory () http://secunia.com/advisories/30908 - Vendor Advisory
References () http://secunia.com/advisories/33668 - Vendor Advisory () http://secunia.com/advisories/33668 - Vendor Advisory
References () http://securityreason.com/securityalert/2813 - () http://securityreason.com/securityalert/2813 -
References () http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1 - () http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1 -
References () http://support.apple.com/kb/HT2163 - () http://support.apple.com/kb/HT2163 -
References () http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540 - () http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540 -
References () http://tomcat.apache.org/security-4.html - Patch, Vendor Advisory () http://tomcat.apache.org/security-4.html - Patch, Vendor Advisory
References () http://tomcat.apache.org/security-5.html - Patch, Vendor Advisory () http://tomcat.apache.org/security-5.html - Patch, Vendor Advisory
References () http://tomcat.apache.org/security-6.html - Patch, Vendor Advisory () http://tomcat.apache.org/security-6.html - Patch, Vendor Advisory
References () http://www.debian.org/security/2008/dsa-1468 - () http://www.debian.org/security/2008/dsa-1468 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2007:241 - () http://www.mandriva.com/security/advisories?name=MDKSA-2007:241 -
References () http://www.osvdb.org/36079 - () http://www.osvdb.org/36079 -
References () http://www.redhat.com/support/errata/RHSA-2007-0569.html - () http://www.redhat.com/support/errata/RHSA-2007-0569.html -
References () http://www.redhat.com/support/errata/RHSA-2008-0261.html - () http://www.redhat.com/support/errata/RHSA-2008-0261.html -
References () http://www.securityfocus.com/archive/1/471357/100/0/threaded - () http://www.securityfocus.com/archive/1/471357/100/0/threaded -
References () http://www.securityfocus.com/archive/1/500396/100/0/threaded - () http://www.securityfocus.com/archive/1/500396/100/0/threaded -
References () http://www.securityfocus.com/archive/1/500412/100/0/threaded - () http://www.securityfocus.com/archive/1/500412/100/0/threaded -
References () http://www.securityfocus.com/bid/24475 - () http://www.securityfocus.com/bid/24475 -
References () http://www.securitytracker.com/id?1018245 - () http://www.securitytracker.com/id?1018245 -
References () http://www.vupen.com/english/advisories/2007/2213 - () http://www.vupen.com/english/advisories/2007/2213 -
References () http://www.vupen.com/english/advisories/2007/3386 - () http://www.vupen.com/english/advisories/2007/3386 -
References () http://www.vupen.com/english/advisories/2008/1979/references - () http://www.vupen.com/english/advisories/2008/1979/references -
References () http://www.vupen.com/english/advisories/2008/1981/references - () http://www.vupen.com/english/advisories/2008/1981/references -
References () http://www.vupen.com/english/advisories/2009/0233 - () http://www.vupen.com/english/advisories/2009/0233 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/34868 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/34868 -
References () https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E - () https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E -
References () https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E - () https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E -
References () https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E - () https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11287 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11287 -
References () https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html - () https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html -

07 Nov 2023, 02:00

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E', 'name': '[tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/', 'tags': [], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E', 'name': '[tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/', 'tags': [], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E', 'name': '[tomcat-dev] 20200213 svn commit: r1873980 [24/34] - /tomcat/site/trunk/docs/', 'tags': [], 'refsource': 'MLIST'}
  • () https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E -
  • () https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E -
  • () https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E -

Information

Published : 2007-06-14 23:30

Updated : 2024-11-21 00:30


NVD link : CVE-2007-2450

Mitre link : CVE-2007-2450

CVE.ORG link : CVE-2007-2450


JSON object : View

Products Affected

apache

  • tomcat
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')