CVE-2007-3386
Detail
Deferred
This CVE record is not being prioritized for NVD enrichment efforts due to resource or other concerns.
Current Description
Cross-site scripting (XSS) vulnerability in the Host Manager Servlet for Apache Tomcat 6.0.0 to 6.0.13 and 5.5.0 to 5.5.24 allows remote attackers to inject arbitrary HTML and web script via crafted requests, as demonstrated using the aliases parameter to an html/add action.
View Analysis Description
Analysis
Description
Cross-site scripting (XSS) vulnerability in the Host Manager Servlet for Apache Tomcat 6.0.0 to 6.0.13 and 5.5.0 to 5.5.24 allows remote attackers to inject arbitrary HTML and web script via crafted requests.
Metrics
CVSS Version 4.0
CVSS Version 3.x
CVSS Version 2.0
NVD enrichment efforts reference publicly available information to associate
vector strings. CVSS information contributed by other sources is also
displayed.
CVSS 4.0 Severity and Vector Strings:
NVD assessment
not yet provided.
CVSS 3.x Severity and Vector Strings:
NVD assessment
not yet provided.
CVSS 2.0 Severity and Vector Strings:
Vector:
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
References to Advisories, Solutions, and Tools
By selecting these links, you will be leaving NIST webspace.
We have provided these links to other web sites because they
may have information that would be of interest to you. No
inferences should be drawn on account of other sites being
referenced, or not, from this page. There may be other web
sites that are more appropriate for your purpose. NIST does
not necessarily endorse the views expressed, or concur with
the facts presented on these sites. Further, NIST does not
endorse any commercial products that may be mentioned on
these sites. Please address comments about this page to [email protected] .
URL
Source(s)
Tag(s)
http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx
CVE, Inc., Red Hat
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
CVE, Inc., Red Hat
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01192554
CVE, Inc., Red Hat
http://jvn.jp/jp/JVN%2359851336/index.html
CVE, Inc., Red Hat
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
CVE, Inc., Red Hat
http://osvdb.org/36417
CVE, Inc., Red Hat
http://secunia.com/advisories/26465
CVE, Inc., Red Hat
http://secunia.com/advisories/26898
CVE, Inc., Red Hat
http://secunia.com/advisories/27037
CVE, Inc., Red Hat
http://secunia.com/advisories/27267
CVE, Inc., Red Hat
http://secunia.com/advisories/27727
CVE, Inc., Red Hat
http://secunia.com/advisories/28317
CVE, Inc., Red Hat
http://secunia.com/advisories/33668
CVE, Inc., Red Hat
http://securityreason.com/securityalert/3010
CVE, Inc., Red Hat
http://securitytracker.com/id?1018558
CVE, Inc., Red Hat
http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540
CVE, Inc., Red Hat
http://tomcat.apache.org/security-6.html
CVE, Inc., Red Hat
Patch
http://www.debian.org/security/2008/dsa-1447
CVE, Inc., Red Hat
http://www.mandriva.com/security/advisories?name=MDKSA-2007:241
CVE, Inc., Red Hat
http://www.redhat.com/support/errata/RHSA-2007-0871.html
CVE, Inc., Red Hat
http://www.securityfocus.com/archive/1/476448/100/0/threaded
CVE, Inc., Red Hat
http://www.securityfocus.com/archive/1/500396/100/0/threaded
CVE, Inc., Red Hat
http://www.securityfocus.com/archive/1/500412/100/0/threaded
CVE, Inc., Red Hat
http://www.securityfocus.com/bid/25314
CVE, Inc., Red Hat
http://www.vupen.com/english/advisories/2007/2880
CVE, Inc., Red Hat
http://www.vupen.com/english/advisories/2007/3386
CVE, Inc., Red Hat
http://www.vupen.com/english/advisories/2007/3527
CVE, Inc., Red Hat
http://www.vupen.com/english/advisories/2009/0233
CVE, Inc., Red Hat
https://exchange.xforce.ibmcloud.com/vulnerabilities/36001
CVE, Inc., Red Hat
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10077
CVE, Inc., Red Hat
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html
CVE, Inc., Red Hat
Weakness Enumeration
CWE-ID
CWE Name
Source
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
NIST  
Change History
6 change records found show changes
CVE Modified by CVE 11/20/2024 7:33:06 PM
Action
Type
Old Value
New Value
Added
Reference
http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx
Added
Reference
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
Added
Reference
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
Added
Reference
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01192554
Added
Reference
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01192554
Added
Reference
http://jvn.jp/jp/JVN%2359851336/index.html
Added
Reference
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
Added
Reference
http://osvdb.org/36417
Added
Reference
http://secunia.com/advisories/26465
Added
Reference
http://secunia.com/advisories/26898
Added
Reference
http://secunia.com/advisories/27037
Added
Reference
http://secunia.com/advisories/27267
Added
Reference
http://secunia.com/advisories/27727
Added
Reference
http://secunia.com/advisories/28317
Added
Reference
http://secunia.com/advisories/33668
Added
Reference
http://securityreason.com/securityalert/3010
Added
Reference
http://securitytracker.com/id?1018558
Added
Reference
http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540
Added
Reference
http://tomcat.apache.org/security-6.html
Added
Reference
http://www.debian.org/security/2008/dsa-1447
Added
Reference
http://www.mandriva.com/security/advisories?name=MDKSA-2007:241
Added
Reference
http://www.redhat.com/support/errata/RHSA-2007-0871.html
Added
Reference
http://www.securityfocus.com/archive/1/476448/100/0/threaded
Added
Reference
http://www.securityfocus.com/archive/1/500396/100/0/threaded
Added
Reference
http://www.securityfocus.com/archive/1/500412/100/0/threaded
Added
Reference
http://www.securityfocus.com/bid/25314
Added
Reference
http://www.vupen.com/english/advisories/2007/2880
Added
Reference
http://www.vupen.com/english/advisories/2007/3386
Added
Reference
http://www.vupen.com/english/advisories/2007/3527
Added
Reference
http://www.vupen.com/english/advisories/2009/0233
Added
Reference
https://exchange.xforce.ibmcloud.com/vulnerabilities/36001
Added
Reference
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10077
Added
Reference
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html
CVE Modified by Red Hat, Inc. 5/13/2024 9:46:09 PM
Action
Type
Old Value
New Value
CVE Modified by Red Hat, Inc. 10/16/2018 12:48:54 PM
Action
Type
Old Value
New Value
Added
Reference
http://www.securityfocus.com/archive/1/476448/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/500396/100/0/threaded [No Types Assigned]
Added
Reference
http://www.securityfocus.com/archive/1/500412/100/0/threaded [No Types Assigned]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/476448/100/0/threaded [Patch]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/500396/100/0/threaded [No Types Assigned]
Removed
Reference
http://www.securityfocus.com/archive/1/archive/1/500412/100/0/threaded [No Types Assigned]
CVE Modified by Red Hat, Inc. 10/10/2017 9:32:46 PM
Action
Type
Old Value
New Value
Added
Reference
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10077 [No Types Assigned]
Removed
Reference
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10077 [No Types Assigned]
CVE Modified by Red Hat, Inc. 7/28/2017 9:32:13 PM
Action
Type
Old Value
New Value
Added
Reference
https://exchange.xforce.ibmcloud.com/vulnerabilities/36001 [No Types Assigned]
Removed
Reference
http://xforce.iss.net/xforce/xfdb/36001 [No Types Assigned]
Initial CVE Analysis 8/15/2007 1:51:00 PM
Action
Type
Old Value
New Value
Quick Info
CVE Dictionary Entry: CVE-2007-3386 NVD
Published Date: 08/14/2007 NVD
Last Modified: 04/08/2025
Source: Red Hat, Inc.