Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

php -- strip_tags cross-site scripting vulnerability

Information

Severity

Severity

Medium

Family

Family

FreeBSD Local Security Checks

CVSSv2 Base

CVSSv2 Base

6.8

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

15 years ago

Modified

Modified

7 years ago

Summary

The remote host is missing an update to the system as announced in the referenced advisory.

Insight

Insight

The following packages are affected: mod_php4-twig php4 php4-cgi php4-cli php4-dtc php4-horde php4-nms mod_php4 php5 php5-cgi php5-cli mod_php5 CVE-2004-0595 The strip_tags function in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, does not filter null (\0) characters within tag names when restricting input to allowed tags, which allows dangerous tags to be processed by web browsers such as Internet Explorer and Safari, which ignore null characters and facilitate the exploitation of cross-site scripting (XSS) vulnerabilities.

Solution

Solution

Update your system with the appropriate patches or software upgrades. http://security.e-matters.de/advisories/122004.html http://marc.theaimsgroup.com/?l=bugtraq&m=108981589117423 http://www.vuxml.org/freebsd/edf61c61-0f07-11d9-8393-000103ccf9d6.html

Common Vulnerabilities and Exposures (CVE)