Информационная безопасность
[RU] switch to English

Многочисленные уязвимости в расширении фильтрации PHP (multiple bugs)
Опубликовано:14 марта 2007 г.
SecurityVulns ID:7399
Уровень опасности:
Описание:Выход за границы буфера, обход фильтрации.
Затронутые продукты:PHP : PHP 5.2
CVE:CVE-2007-1454 (ext/filter in PHP 5.2.0, when FILTER_SANITIZE_STRING is used with the FILTER_FLAG_STRIP_LOW flag, does not properly strip HTML tags, which allows remote attackers to conduct cross-site scripting (XSS) attacks via HTML with a '<' character followed by certain whitespace characters, which passes one filter but is collapsed into a valid tag, as demonstrated using %0b.)
 CVE-2007-1453 (Buffer underflow in the PHP_FILTER_TRIM_DEFAULT macro in the filtering extension (ext/filter) in PHP 5.2.0 allows context-dependent attackers to execute arbitrary code by calling filter_var with certain modes such as FILTER_VALIDATE_INT, which causes filter to write a null byte in whitespace that precedes the buffer.)
Оригинальный текстdocumentPHP-SECURITY, MOPB-19-2007:PHP ext/filter Space Trimming Buffer Underflow Vulnerability (14.03.2007)
 documentPHP-SECURITY, MOPB-18-2007:PHP ext/filter HTML Tag Stripping Bypass Vulnerability (14.03.2007)
Файлы:PHP ext/filter Space Trimming Buffer Underflow Vulnerability

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород