CVE-2007-2450

N/A Unknown
Published: June 14, 2007 Modified: April 23, 2026
View on NVD

Description

Multiple cross-site scripting (XSS) vulnerabilities in the (1) Manager and (2) Host Manager web applications in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote authenticated users to inject arbitrary web script or HTML via a parameter name to manager/html/upload, and other unspecified vectors.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/25678
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/26076
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/27037
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/27727
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/28549
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/30802
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/30899
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/30908
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/33668
Source: secalert@redhat.com
Vendor Advisory
http://support.apple.com/kb/HT2163
Source: secalert@redhat.com
http://tomcat.apache.org/security-4.html
Source: secalert@redhat.com
Patch Vendor Advisory
http://tomcat.apache.org/security-5.html
Source: secalert@redhat.com
Patch Vendor Advisory
http://tomcat.apache.org/security-6.html
Source: secalert@redhat.com
Patch Vendor Advisory
http://www.osvdb.org/36079
Source: secalert@redhat.com
http://www.securityfocus.com/bid/24475
Source: secalert@redhat.com
http://jvn.jp/jp/JVN%2307100457/index.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/25678
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26076
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27037
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27727
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/28549
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/30802
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/30899
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/30908
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/33668
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://securityreason.com/securityalert/2813
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.apple.com/kb/HT2163
Source: af854a3a-2127-422b-91ae-364da2661108
http://tomcat.apache.org/security-4.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://tomcat.apache.org/security-5.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://tomcat.apache.org/security-6.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.debian.org/security/2008/dsa-1468
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2007:241
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/36079
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2007-0569.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2008-0261.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/471357/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/500396/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/500412/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/24475
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1018245
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/2213
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/3386
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/1979/references
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/1981/references
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/0233
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/34868
Source: af854a3a-2127-422b-91ae-364da2661108

84 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
1.2%
79th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

apache