First published: Fri Jul 16 2004(Updated: )
The strip_tags function in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, does not filter null (\0) characters within tag names when restricting input to allowed tags, which allows dangerous tags to be processed by web browsers such as Internet Explorer and Safari, which ignore null characters and facilitate the exploitation of cross-site scripting (XSS) vulnerabilities.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Fedora Core | =core_2.0 | |
Trustix Secure Linux | =2.0 | |
Redhat Fedora Core | =core_1.0 | |
Avaya Converged Communications Server | =2.0 | |
Trustix Secure Linux | =1.5 | |
Trustix Secure Linux | =2.1 | |
Avaya S8500 | =r2.0.1 | |
PHP PHP | =4.2.0 | |
PHP PHP | =4.1.0 | |
PHP PHP | =4.0.4 | |
PHP PHP | =4.3.0 | |
PHP PHP | =4.0.5 | |
PHP PHP | =5.0-rc1 | |
Avaya S8300 | =r2.0.0 | |
PHP PHP | =4.3.6 | |
Avaya Integrated Management | ||
PHP PHP | =4.3.7 | |
PHP PHP | =4.2.2 | |
PHP PHP | =4.3.2 | |
PHP PHP | =4.0.7 | |
PHP PHP | =4.0.2 | |
PHP PHP | =4.3.3 | |
PHP PHP | =5.0-rc3 | |
PHP PHP | =4.1.1 | |
Avaya S8700 | =r2.0.1 | |
PHP PHP | =4.2.3 | |
PHP PHP | =4.0 | |
PHP PHP | =4.0.6 | |
PHP PHP | =5.0-rc2 | |
PHP PHP | =4.1.2 | |
Avaya S8700 | =r2.0.0 | |
PHP PHP | =4.3.1 | |
Avaya S8500 | =r2.0.0 | |
PHP PHP | =4.2.1 | |
PHP PHP | =4.0.1 | |
PHP PHP | =4.0.3 | |
PHP PHP | =4.3.5 | |
Avaya S8300 | =r2.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.