Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2007-3008
Modified
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-04 Jun, 2007 | 17:30
Updated At-23 Apr, 2026 | 00:35

Mbedthis AppWeb before 2.2.2 enables the HTTP TRACE method, which has unspecified impact probably related to remote information leaks and cross-site tracing (XST) attacks, a related issue to CVE-2004-2320 and CVE-2005-3398.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
Type: Primary
Version: 2.0
Base score: 4.3
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CPE Matches

mbedthis_software
mbedthis_software
>>mbedthis_appweb_http_server>>2.0.0
cpe:2.3:a:mbedthis_software:mbedthis_appweb_http_server:2.0.0:*:*:*:*:*:*:*
mbedthis_software
mbedthis_software
>>mbedthis_appweb_http_server>>2.0.1
cpe:2.3:a:mbedthis_software:mbedthis_appweb_http_server:2.0.1:*:*:*:*:*:*:*
mbedthis_software
mbedthis_software
>>mbedthis_appweb_http_server>>2.0.2
cpe:2.3:a:mbedthis_software:mbedthis_appweb_http_server:2.0.2:*:*:*:*:*:*:*
mbedthis_software
mbedthis_software
>>mbedthis_appweb_http_server>>2.0.3
cpe:2.3:a:mbedthis_software:mbedthis_appweb_http_server:2.0.3:*:*:*:*:*:*:*
mbedthis_software
mbedthis_software
>>mbedthis_appweb_http_server>>2.0.4
cpe:2.3:a:mbedthis_software:mbedthis_appweb_http_server:2.0.4:*:*:*:*:*:*:*
mbedthis_software
mbedthis_software
>>mbedthis_appweb_http_server>>2.0.5
cpe:2.3:a:mbedthis_software:mbedthis_appweb_http_server:2.0.5:*:*:*:*:*:*:*
mbedthis_software
mbedthis_software
>>mbedthis_appweb_http_server>>2.1.0
cpe:2.3:a:mbedthis_software:mbedthis_appweb_http_server:2.1.0:*:*:*:*:*:*:*
mbedthis_software
mbedthis_software
>>mbedthis_appweb_http_server>>2.1.1
cpe:2.3:a:mbedthis_software:mbedthis_appweb_http_server:2.1.1:*:*:*:*:*:*:*
mbedthis_software
mbedthis_software
>>mbedthis_appweb_http_server>>2.2.0
cpe:2.3:a:mbedthis_software:mbedthis_appweb_http_server:2.2.0:*:*:*:*:*:*:*
mbedthis_software
mbedthis_software
>>mbedthis_appweb_http_server>>2.2.1
cpe:2.3:a:mbedthis_software:mbedthis_appweb_http_server:2.2.1:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-79Primarynvd@nist.gov
CWE-200Primarynvd@nist.gov
CWE ID: CWE-79
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-200
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

Organization : Red Hat
Last Modified : 2008-03-05T00:00:00

The Apache Software Foundation do not treat this as a security issue. A configuration change can be made to disable the ability to respond to HTTP TRACE requests if required. For more information please see: http://www.apacheweek.com/issues/03-01-24#news

References
HyperlinkSourceResource
http://secunia.com/advisories/25636cve@mitre.org
Vendor Advisory
http://www.appwebserver.org/forum/viewtopic.php?t=996cve@mitre.org
N/A
http://www.mbedthis.com/products/appWeb/doc/product/newFeatures.htmlcve@mitre.org
N/A
http://www.osvdb.org/35511cve@mitre.org
N/A
http://www.securityfocus.com/bid/24456cve@mitre.org
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/34854cve@mitre.org
N/A
http://secunia.com/advisories/25636af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.appwebserver.org/forum/viewtopic.php?t=996af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.mbedthis.com/products/appWeb/doc/product/newFeatures.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.osvdb.org/35511af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/24456af854a3a-2127-422b-91ae-364da2661108
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/34854af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://secunia.com/advisories/25636
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: http://www.appwebserver.org/forum/viewtopic.php?t=996
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.mbedthis.com/products/appWeb/doc/product/newFeatures.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.osvdb.org/35511
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/24456
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/34854
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://secunia.com/advisories/25636
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://www.appwebserver.org/forum/viewtopic.php?t=996
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.mbedthis.com/products/appWeb/doc/product/newFeatures.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.osvdb.org/35511
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securityfocus.com/bid/24456
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/34854
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Change History
0Changes found

Details not found