First published: Fri Jul 16 2004(Updated: )
The strip_tags function in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, does not filter null (\0) characters within tag names when restricting input to allowed tags, which allows dangerous tags to be processed by web browsers such as Internet Explorer and Safari, which ignore null characters and facilitate the exploitation of cross-site scripting (XSS) vulnerabilities.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
avaya converged communications server | =2.0 | |
Red Hat Fedora Core | =core_1.0 | |
Red Hat Fedora Core | =core_2.0 | |
Trustix Secure Linux | =1.5 | |
Trustix Secure Linux | =2.0 | |
Trustix Secure Linux | =2.1 | |
Avaya Integrated Management Suite | ||
PHP | =4.0 | |
PHP | =4.0.1 | |
PHP | =4.0.2 | |
PHP | =4.0.3 | |
PHP | =4.0.4 | |
PHP | =4.0.5 | |
PHP | =4.0.6 | |
PHP | =4.0.7 | |
PHP | =4.1.0 | |
PHP | =4.1.1 | |
PHP | =4.1.2 | |
PHP | =4.2.0 | |
PHP | =4.2.1 | |
PHP | =4.2.2 | |
PHP | =4.2.3 | |
PHP | =4.3.0 | |
PHP | =4.3.1 | |
PHP | =4.3.2 | |
PHP | =4.3.3 | |
PHP | =4.3.5 | |
PHP | =4.3.6 | |
PHP | =4.3.7 | |
PHP | =5.0-rc1 | |
PHP | =5.0-rc2 | |
PHP | =5.0-rc3 | |
Avaya S8300 | =r2.0.0 | |
Avaya S8300 | =r2.0.1 | |
Avaya S8500 | =r2.0.0 | |
Avaya S8500 | =r2.0.1 | |
avaya s8700 | =r2.0.0 | |
avaya s8700 | =r2.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0595 is considered a moderate severity vulnerability due to its potential to allow script execution in web applications.
To fix CVE-2004-0595, update PHP to a version higher than 5.0.0RC3, where the null character filtering issue has been resolved.
CVE-2004-0595 affects PHP versions 4.x up to 4.3.7 and 5.x up to 5.0.0RC3.
CVE-2004-0595 can enable cross-site scripting (XSS) attacks due to improper filtering of null characters.
Users of PHP versions affected by CVE-2004-0595, particularly those implementing the strip_tags function in their web applications, are impacted.