Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2004-0595

7 documents6 sources
Severity
6.8MEDIUM
EPSS
49.3%
top 2.21%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJul 27
Latest updateApr 29

Description

The strip_tags function in PHP 4.x up to 4.3.7, and 5.x up to 5.0.0RC3, does not filter null (\0) characters within tag names when restricting input to allowed tags, which allows dangerous tags to be processed by web browsers such as Internet Explorer and Safari, which ignore null characters and facilitate the exploitation of cross-site scripting (XSS) vulnerabilities.

CVSS vector

AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4

Affected Packages7 packages

NVDphp/php23 versions+22
NVDavaya/s8300r2.0.0, r2.0.1+1
NVDavaya/s8500r2.0.0, r2.0.1+1
NVDavaya/s8700r2.0.0, r2.0.1+1
NVDredhat/fedora_corecore_1.0, core_2.0+1

Patches

🔴Vulnerability Details

2
GHSA
GHSA-h8wj-59vf-r37g: The strip_tags function in PHP 42022-04-29
CVEList
CVE-2004-0595: The strip_tags function in PHP 42004-07-16

💥Exploits & PoCs

1
Exploit-DB
PHP 4.x/5.0 - 'Strip_Tags()' Function Bypass2004-07-14

📋Vendor Advisories

1
Red Hat
security flaw2004-07-14

💬Community

2
Bugzilla
CVE-2004-0595 security flaw2018-08-16
Bugzilla
CVE-2004-0595 PHP flaws (CVE-2004-0594 CVE-2004-1018 CVE-2004-1019)2005-10-25