Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-21705

Опубликовано: 04 окт. 2021
Источник: debian
EPSS Низкий

Описание

In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php8.0fixed8.0.8-1package
php7.4fixed7.4.21-1+deb11u1package
php7.3removedpackage
php7.0removedpackage

Примечания

  • Fixed in 8.0.8, 7.4.21, 7.3.29

  • PHP Bug: https://bugs.php.net/81122

EPSS

Процентиль: 50%
0.00267
Низкий

Связанные уязвимости

CVSS3: 4.3
ubuntu
больше 3 лет назад

In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.

CVSS3: 5.3
redhat
почти 4 года назад

In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.

CVSS3: 4.3
nvd
больше 3 лет назад

In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.

suse-cvrf
почти 4 года назад

Security update for php7

suse-cvrf
почти 4 года назад

Security update for php72

EPSS

Процентиль: 50%
0.00267
Низкий