CVE-2007-3386 : Detail

CVE-2007-3386

Cross-site Scripting
A03-Injection
1.84%V3
Network
2007-08-14
20h00 +00:00
2018-10-16
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Cross-site scripting (XSS) vulnerability in the Host Manager Servlet for Apache Tomcat 6.0.0 to 6.0.13 and 5.5.0 to 5.5.24 allows remote attackers to inject arbitrary HTML and web script via crafted requests, as demonstrated using the aliases parameter to an html/add action.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N [email protected]

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 30495

Publication date : 2007-08-13 22h00 +00:00
Author : NTT OSS CENTER
EDB Verified : Yes

source: https://www.securityfocus.com/bid/25314/info Apache Tomcat Host Manager Servlet is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input. An attacker can exploit this vulnerability to inject HTML and script code into the browser of an unsuspecting victim. The attacker may then steal cookie-based authentication credentials and launch other attacks. Apache Tomcat 5.5.0 through 5.5.24 and 6.0.0 through 6.0.13 are affected. <form action="http://localhost:8080/host-manager/html/add" method="get"> <input type="hidden" NAME='name' VALUE="aaa"> <input type="hidden" NAME='aliases' VALUE="<script>alert()</script>"> <input type="submit"> </form>

Products Mentioned

Configuraton 0

Apache>>Tomcat >> Version 5.5.0

Apache>>Tomcat >> Version 5.5.1

Apache>>Tomcat >> Version 5.5.2

Apache>>Tomcat >> Version 5.5.3

Apache>>Tomcat >> Version 5.5.4

Apache>>Tomcat >> Version 5.5.5

Apache>>Tomcat >> Version 5.5.6

Apache>>Tomcat >> Version 5.5.7

Apache>>Tomcat >> Version 5.5.8

Apache>>Tomcat >> Version 5.5.9

Apache>>Tomcat >> Version 5.5.10

Apache>>Tomcat >> Version 5.5.11

Apache>>Tomcat >> Version 5.5.12

Apache>>Tomcat >> Version 5.5.13

Apache>>Tomcat >> Version 5.5.14

Apache>>Tomcat >> Version 5.5.15

Apache>>Tomcat >> Version 5.5.16

Apache>>Tomcat >> Version 5.5.17

Apache>>Tomcat >> Version 5.5.18

Apache>>Tomcat >> Version 5.5.19

Apache>>Tomcat >> Version 5.5.20

Apache>>Tomcat >> Version 5.5.21

Apache>>Tomcat >> Version 5.5.22

Apache>>Tomcat >> Version 5.5.23

Apache>>Tomcat >> Version 5.5.24

Apache>>Tomcat >> Version 6.0.0

Apache>>Tomcat >> Version 6.0.1

Apache>>Tomcat >> Version 6.0.2

Apache>>Tomcat >> Version 6.0.3

Apache>>Tomcat >> Version 6.0.4

Apache>>Tomcat >> Version 6.0.5

Apache>>Tomcat >> Version 6.0.6

Apache>>Tomcat >> Version 6.0.7

Apache>>Tomcat >> Version 6.0.8

Apache>>Tomcat >> Version 6.0.9

Apache>>Tomcat >> Version 6.0.10

Apache>>Tomcat >> Version 6.0.11

Apache>>Tomcat >> Version 6.0.12

Apache>>Tomcat >> Version 6.0.13

References

http://osvdb.org/36417
Tags : vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/27267
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2007/3527
Tags : vdb-entry, x_refsource_VUPEN
http://jvn.jp/jp/JVN%2359851336/index.html
Tags : third-party-advisory, x_refsource_JVN
http://www.securityfocus.com/bid/25314
Tags : vdb-entry, x_refsource_BID
http://secunia.com/advisories/26465
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/33668
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/26898
Tags : third-party-advisory, x_refsource_SECUNIA
http://securitytracker.com/id?1018558
Tags : vdb-entry, x_refsource_SECTRACK
http://securityreason.com/securityalert/3010
Tags : third-party-advisory, x_refsource_SREASON
http://www.vupen.com/english/advisories/2007/2880
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/28317
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/0233
Tags : vdb-entry, x_refsource_VUPEN
http://www.redhat.com/support/errata/RHSA-2007-0871.html
Tags : vendor-advisory, x_refsource_REDHAT
http://www.vupen.com/english/advisories/2007/3386
Tags : vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/27037
Tags : third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/27727
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2008/dsa-1447
Tags : vendor-advisory, x_refsource_DEBIAN
http://www.mandriva.com/security/advisories?name=MDKSA-2007:241
Tags : vendor-advisory, x_refsource_MANDRIVA