The htmlspecialchars function in PHP before 5.2.12 does not properly handle (1) overlong UTF-8 sequences, (2) invalid Shift_JIS sequences, and (3) invalid EUC-JP sequences, which allows remote attackers to conduct cross-site scripting (XSS) attacks by placing a crafted byte sequence before a special character.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/37389 | vdb entry exploit |
http://www.php.net/releases/5_2_12.php | |
http://bugs.php.net/bug.php?id=49785 | |
http://secunia.com/advisories/40262 | third party advisory |
http://marc.info/?l=bugtraq&m=127680701405735&w=2 | vendor advisory |
http://securitytracker.com/id?1023372 | vdb entry exploit |
http://secunia.com/advisories/37821 | third party advisory vendor advisory |
http://secunia.com/advisories/38648 | third party advisory |
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html | vendor advisory |
http://www.php.net/ChangeLog-5.php | patch |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7085 | vdb entry signature |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10005 | vdb entry signature |
http://support.apple.com/kb/HT4077 | |
http://www.vupen.com/english/advisories/2009/3593 | vdb entry vendor advisory |
http://www.debian.org/security/2010/dsa-2001 | vendor advisory |