CVE-2004-0595
Summary
| CVE | CVE-2004-0595 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2004-07-27 04:00:00 UTC |
| Updated | 2025-04-03 01:03:51 UTC |
| Description | The strip_tags function in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, does not filter null (\0) characters within tag names when restricting input to allowed tags, which allows dangerous tags to be processed by web browsers such as Internet Explorer and Safari, which ignore null characters and facilitate the exploitation of cross-site scripting (XSS) vulnerabilities. |
Risk And Classification
Primary CVSS: v2.0 6.8 from [email protected]
AV:N/AC:M/Au:N/C:P/I:P/A:P
Problem Types: NVD-CWE-Other | n/a
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
MediumAuthentication
NoneConfidentiality
PartialIntegrity
PartialAvailability
PartialAV:N/AC:M/Au:N/C:P/I:P/A:P
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Avaya | Converged Communications Server | 2.0 | All | All | All |
| Application | Avaya | Integrated Management | All | All | All | All |
| Hardware | Avaya | S8300 | r2.0.0 | All | All | All |
| Hardware | Avaya | S8300 | r2.0.1 | All | All | All |
| Hardware | Avaya | S8500 | r2.0.0 | All | All | All |
| Hardware | Avaya | S8500 | r2.0.1 | All | All | All |
| Hardware | Avaya | S8700 | r2.0.0 | All | All | All |
| Hardware | Avaya | S8700 | r2.0.1 | All | All | All |
| Application | Php | Php | 4.0 | All | All | All |
| Application | Php | Php | 4.0.1 | All | All | All |
| Application | Php | Php | 4.0.2 | All | All | All |
| Application | Php | Php | 4.0.3 | All | All | All |
| Application | Php | Php | 4.0.4 | All | All | All |
| Application | Php | Php | 4.0.5 | All | All | All |
| Application | Php | Php | 4.0.6 | All | All | All |
| Application | Php | Php | 4.0.7 | All | All | All |
| Application | Php | Php | 4.1.0 | All | All | All |
| Application | Php | Php | 4.1.1 | All | All | All |
| Application | Php | Php | 4.1.2 | All | All | All |
| Application | Php | Php | 4.2.0 | All | All | All |
| Application | Php | Php | 4.2.1 | All | All | All |
| Application | Php | Php | 4.2.2 | All | All | All |
| Application | Php | Php | 4.2.3 | All | All | All |
| Application | Php | Php | 4.3.0 | All | All | All |
| Application | Php | Php | 4.3.1 | All | All | All |
| Application | Php | Php | 4.3.2 | All | All | All |
| Application | Php | Php | 4.3.3 | All | All | All |
| Application | Php | Php | 4.3.5 | All | All | All |
| Application | Php | Php | 4.3.6 | All | All | All |
| Application | Php | Php | 4.3.7 | All | All | All |
| Application | Php | Php | 5.0 | rc1 | All | All |
| Application | Php | Php | 5.0 | rc2 | All | All |
| Application | Php | Php | 5.0 | rc3 | All | All |
| Operating System | Redhat | Fedora Core | core_1.0 | All | All | All |
| Operating System | Redhat | Fedora Core | core_2.0 | All | All | All |
| Operating System | Trustix | Secure Linux | 1.5 | All | All | All |
| Operating System | Trustix | Secure Linux | 2.0 | All | All | All |
| Operating System | Trustix | Secure Linux | 2.1 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Gentoo Linux Documentation -- PHP: Multiple security vulnerabilities | af854a3a-2127-422b-91ae-364da2661108 | www.gentoo.org | |
| redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| Debian -- Security Information -- DSA-669-1 php3 | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| rhn.redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| [Full-Disclosure] Advisory 12/2004: PHP strip_tags() bypass vulnerability | af854a3a-2127-422b-91ae-364da2661108 | lists.grok.org.uk | |
| MandrakeSecure: MandrakeSoft Security Advisory MDKSA-2004:068 : php | af854a3a-2127-422b-91ae-364da2661108 | www.mandrakesecure.net | |
| 'Advisory 11/2004: PHP memory_limit remote vulnerability' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| Security Announcement | af854a3a-2127-422b-91ae-364da2661108 | www.novell.com | |
| Debian -- Security Information -- DSA-531-1 php4 | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | Patch, Vendor Advisory |
| '[security bulletin] SSRT4777 HP-UX Apache, PHP remote code execution, Denial of Service' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | |
| redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| Repository / Oval Repository | af854a3a-2127-422b-91ae-364da2661108 | oval.cisecurity.org | |
| '[OpenPKG-SA-2004.034] OpenPKG Security Advisory (php)' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | |
| Home - Conectiva | af854a3a-2127-422b-91ae-364da2661108 | distro.conectiva.com.br | |
| 'TSSA-2004-013 - php' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | |
| PHP Strip_Tags() Function Bypass Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Exploit, Patch, Vendor Advisory |
| redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.