php.net |  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #2477 Possible strip_tags() and fgetss() vulnerability
Submitted: 1999-10-10 00:42 UTC Modified: 1999-12-26 11:22 UTC
From: deicide at gameaholic dot com Assigned:
Status: Closed Package: Other
PHP Version: 3.0.12 OS:
Private report: No CVE-ID: None
Welcome back! If you're the original bug submitter, here's where you can edit the bug or add additional notes.
If this is not your bug, you can add a comment by following this link.
If this is your bug, but you forgot your password, you can retrieve your password here.
Password:
Status:
Package:
Bug Type:
Summary:
From: deicide at gameaholic dot com
New email:
PHP Version: OS:

 

 [1999-10-10 00:42 UTC] deicide at gameaholic dot com
Last week a "mis-feature" was reported on Bugtraq regarding some Netscape versions that treat 0x8b and 0x9b characters as [less than] and [greater than] signs.

I do not personally have a platform that was confirmed to be vulnerable so I can't actually test this under PHP, but the issue seems to be quite easy to fix.  The thread on Bugtraq can be viewed at the link below. The fix would be to modify strip_tags() and fgetss() functions to tread 0x8b and 0x9b characters equally to [less than] and [greater than] characters while parsing out HTML tags.

http://www.securityfocus.org/templates/archive.pike?list=1&date=1999-10-01&thread=Pine.SGI.4.05.9910051008450.149247-100000@tiger.coe.missouri.edu

Patches

Add a Patch

Pull Requests

Add a Pull Request

History

AllCommentsChangesGit/SVN commitsRelated reports
 [1999-12-26 11:22 UTC] rasmus at cvs dot php dot net
This is not applicable to PHP
 
PHP Copyright © 2001-2024 The PHP Group
All rights reserved.
Last updated: Thu Apr 25 22:01:29 2024 UTC