php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #2477 Possible strip_tags() and fgetss() vulnerability
Submitted: 1999-10-10 00:42 UTC Modified: 1999-12-26 11:22 UTC
From: deicide at gameaholic dot com Assigned:
Status: Closed Package: Other
PHP Version: 3.0.12 OS:
Private report: No CVE-ID: None
Anyone can comment on a bug. Have a simpler test case? Does it work for you on a different platform? Let us know!
Just going to say 'Me too!'? Don't clutter the database with that please !
Your email address:
MUST BE VALID
Solve the problem:
26 + 35 = ?
Subscribe to this entry?

 
 [1999-10-10 00:42 UTC] deicide at gameaholic dot com
Last week a "mis-feature" was reported on Bugtraq regarding some Netscape versions that treat 0x8b and 0x9b characters as [less than] and [greater than] signs.

I do not personally have a platform that was confirmed to be vulnerable so I can't actually test this under PHP, but the issue seems to be quite easy to fix.  The thread on Bugtraq can be viewed at the link below. The fix would be to modify strip_tags() and fgetss() functions to tread 0x8b and 0x9b characters equally to [less than] and [greater than] characters while parsing out HTML tags.

http://www.securityfocus.org/templates/archive.pike?list=1&date=1999-10-01&thread=Pine.SGI.4.05.9910051008450.149247-100000@tiger.coe.missouri.edu

Patches

Pull Requests

History

AllCommentsChangesGit/SVN commitsRelated reports
 [1999-12-26 11:22 UTC] rasmus at cvs dot php dot net
This is not applicable to PHP
 
PHP Copyright © 2001-2025 The PHP Group
All rights reserved.
Last updated: Tue May 13 09:01:27 2025 UTC