First published: Wed Mar 14 2007(Updated: )
ext/filter in PHP 5.2.0, when FILTER_SANITIZE_STRING is used with the FILTER_FLAG_STRIP_LOW flag, does not properly strip HTML tags, which allows remote attackers to conduct cross-site scripting (XSS) attacks via HTML with a '<' character followed by certain whitespace characters, which passes one filter but is collapsed into a valid tag, as demonstrated using %0b.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | =5.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1454 is considered to be a medium severity vulnerability that can lead to cross-site scripting (XSS) attacks.
To fix CVE-2007-1454, upgrade your PHP version to a later version than 5.2.0 where this vulnerability has been addressed.
CVE-2007-1454 affects the ext/filter component in PHP, specifically when using FILTER_SANITIZE_STRING with the FILTER_FLAG_STRIP_LOW flag.
Yes, CVE-2007-1454 can be exploited remotely by attackers to inject malicious scripts through web applications.
CVE-2007-1454 was discovered in PHP version 5.2.0.