Bug 240165 - (CVE-2007-1454) CVE-2007-1454 php filter extension FILTER_SANITIZE_STRING bypass
CVE-2007-1454 php filter extension FILTER_SANITIZE_STRING bypass
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
: 239319 (view as bug list)
Depends On:
  Show dependency treegraph
Reported: 2007-05-15 11:58 EDT by Joe Orton
Modified: 2007-05-15 11:59 EDT (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2007-05-15 11:59:00 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Joe Orton 2007-05-15 11:58:05 EDT
Description of problem:
ext/filter in PHP 5.2.0, when FILTER_SANITIZE_STRING is used with the
FILTER_FLAG_STRIP_LOW flag, does not properly strip HTML tags, which allows
remote attackers to conduct cross-site scripting (XSS) attacks via HTML with a
'<' character followed by certain whitespace characters, which passes one filter
but is collapsed into a valid tag, as demonstrated using %0b.
Comment 1 Joe Orton 2007-05-15 11:59:00 EDT
The 'filter' extension is not currently included in php packages distributed by
Red Hat.
Comment 2 Joe Orton 2007-05-15 11:59:17 EDT
*** Bug 239319 has been marked as a duplicate of this bug. ***

Note You need to log in before you can comment on or make changes to this bug.