php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #2477 Possible strip_tags() and fgetss() vulnerability
Submitted: 1999-10-10 00:42 UTC Modified: 1999-12-26 11:22 UTC
From: deicide at gameaholic dot com Assigned:
Status: Closed Package: Other
PHP Version: 3.0.12 OS:
Private report: No CVE-ID: None
View Add Comment Developer Edit
Welcome! If you don't have a Git account, you can't do anything here.
You can add a comment by following this link or if you reported this bug, you can edit this bug over here.
(description)
Block user comment
Status: Assign to:
Package:
Bug Type:
Summary:
From: deicide at gameaholic dot com
New email:
PHP Version: OS:

 

 [1999-10-10 00:42 UTC] deicide at gameaholic dot com
Last week a "mis-feature" was reported on Bugtraq regarding some Netscape versions that treat 0x8b and 0x9b characters as [less than] and [greater than] signs.

I do not personally have a platform that was confirmed to be vulnerable so I can't actually test this under PHP, but the issue seems to be quite easy to fix.  The thread on Bugtraq can be viewed at the link below. The fix would be to modify strip_tags() and fgetss() functions to tread 0x8b and 0x9b characters equally to [less than] and [greater than] characters while parsing out HTML tags.

http://www.securityfocus.org/templates/archive.pike?list=1&date=1999-10-01&thread=Pine.SGI.4.05.9910051008450.149247-100000@tiger.coe.missouri.edu

Patches

Add a Patch

Pull Requests

Add a Pull Request

History

AllCommentsChangesGit/SVN commitsRelated reports
 [1999-12-26 11:22 UTC] rasmus at cvs dot php dot net
This is not applicable to PHP
 
PHP Copyright © 2001-2024 The PHP Group
All rights reserved.
Last updated: Thu Mar 28 22:01:26 2024 UTC