Vulnerability Name: | CVE-2007-4724 (CCN-36402) |
Assigned: | 2007-05-09 |
Published: | 2007-05-09 |
Updated: | 2018-10-15 |
Summary: | Cross-site request forgery (CSRF) vulnerability in cal2.jsp in the calendar examples application in Apache Tomcat 4.1.31 allows remote attackers to add events as arbitrary users via the time and description parameters.
|
CVSS v3 Severity: | 4.8 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): High Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): Low Availibility (A): Low |
|
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N) 3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): Partial Availibility (A): None | 4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:P) 3.5 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:P/E:H/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): High Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): Partial Availibility (A): Partial |
|
Vulnerability Type: | CWE-352
|
Vulnerability Consequences: | Gain Access |
References: | Source: CCN Type: BugTraq Mailing List, Mon Sep 03 2007 - 22:00:44 CDT Apache tomcat calendar example cross site scripting and cross site request forgery vulnerability
Source: BUGTRAQ Type: UNKNOWN 20070904 Re: Apache tomcat calendar example cross site scripting and cross site request forgery vulnerability
Source: MITRE Type: CNA CVE-2007-4724
Source: OSVDB Type: UNKNOWN 41029
Source: SREASON Type: UNKNOWN 3094
Source: CCN Type: Apache Tomcat Web site Apache Tomcat 4.x vulnerabilities
Source: CCN Type: OSVDB ID: 41029 Apache Tomcat Calendar Examples Application cal2.jsp Multiple Parameter CSRF
Source: BUGTRAQ Type: UNKNOWN 20070904 Apache tomcat calendar example cross site scripting and cross site request forgery vulnerability
Source: XF Type: UNKNOWN tomcat-calendar-csrf(36402)
|
Vulnerable Configuration: | Configuration 1: cpe:/a:apache:tomcat:4.1.31:*:*:*:*:*:*:* Configuration CCN 1: cpe:/a:apache:tomcat:4.0.1:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.0.3:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.0.4:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.10:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.0:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.5.4:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.0.19:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.24:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.0.28:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.5.12:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.5.9:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.5.7:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.0.25:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.0.0:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.0.0:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.0.2:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.0.5:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.0.6:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.1:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.12:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.15:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.2:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.28:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.3:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*OR cpe:/a:apache:tomcat:4.1.31:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.0.1:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.0.10:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.0.11:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.0.12:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.0.13:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.0.14:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.0.15:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.0.16:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.0.17:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.0.18:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.0.2:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.0.21:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.0.22:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.0.23:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.0.24:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.0.26:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.0.27:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.0.29:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.0.3:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.0.30:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.0.4:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.0.5:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.0.6:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.0.7:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.0.8:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.0.9:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.5.0:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.5.1:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.5.10:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.5.11:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.5.13:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.5.14:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.5.15:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.5.2:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.5.3:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.5.5:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.5.6:*:*:*:*:*:*:*OR cpe:/a:apache:tomcat:5.5.8:*:*:*:*:*:*:*
Denotes that component is vulnerable |
BACK |