Vulnerability Details : CVE-2004-0595
The strip_tags function in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, does not filter null (\0) characters within tag names when restricting input to allowed tags, which allows dangerous tags to be processed by web browsers such as Internet Explorer and Safari, which ignore null characters and facilitate the exploitation of cross-site scripting (XSS) vulnerabilities.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2004-0595
- cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*
- cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
- cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
- cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
- cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:integrated_management:*:*:*:*:*:*:*:*
- cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*
- cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*
- cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*
- cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*
- cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*
- cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*
Threat overview for CVE-2004-0595
Top countries where our scanners detected CVE-2004-0595
Top open port discovered on systems with this issue
80
IPs affected by CVE-2004-0595 1,652
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2004-0595!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2004-0595
93.90%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2004-0595
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
References for CVE-2004-0595
-
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000847
CONECTIVA | Análises dos Melhores Produtos Online (#10 Melhores)
-
http://www.redhat.com/support/errata/RHSA-2004-405.html
Support
-
http://www.redhat.com/support/errata/RHSA-2004-395.html
Support
-
http://www.gentoo.org/security/en/glsa/glsa-200407-13.xml
PHP: Multiple security vulnerabilities (GLSA 200407-13) — Gentoo security
-
http://www.novell.com/linux/security/advisories/2004_21_php4.html
404 Page Not Found | SUSE
-
http://www.debian.org/security/2004/dsa-531
Debian -- The Universal Operating SystemPatch;Vendor Advisory
-
http://www.redhat.com/support/errata/RHSA-2004-392.html
Support
-
http://www.redhat.com/support/errata/RHSA-2005-816.html
Support
-
http://marc.info/?l=bugtraq&m=108981780109154&w=2
'Advisory 11/2004: PHP memory_limit remote vulnerability' - MARC
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10619
-
http://marc.info/?l=bugtraq&m=109181600614477&w=2
'[security bulletin] SSRT4777 HP-UX Apache, PHP remote code execution, Denial of Service' - MARC
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/16692
-
http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/023909.html
-
http://www.securityfocus.com/bid/10724
Exploit;Patch;Vendor Advisory
-
http://www.debian.org/security/2005/dsa-669
[SECURITY] [DSA 669-1] New php3 packages fix several vulnerabilities
-
http://marc.info/?l=bugtraq&m=109051444105182&w=2
'[OpenPKG-SA-2004.034] OpenPKG Security Advisory (php)' - MARC
-
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:068
-
http://marc.info/?l=bugtraq&m=108982983426031&w=2
'TSSA-2004-013 - php' - MARC
Jump to