Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-21705

Опубликовано: 01 июл. 2021
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.

A flaw was found in php. Currently, php's FILTER_VALIDATE_URL check doesn't recognize some non-compliant RFC 3986 URLs and returns them as valid. This flaw allows an attacker to craft URLs, which depending on how the URL filter checking is used on the application side, lead to Server Side Request Forgery. This issue presents an integrity risk for the application, as eventually, the attacker can manipulate resources that shouldn't be fully available for users.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6phpOut of support scope
Red Hat Enterprise Linux 7phpOut of support scope
Red Hat Enterprise Linux 8php:7.3/phpOut of support scope
Red Hat Enterprise Linux 9phpNot affected
Red Hat Enterprise Linux 8phpFixedRHSA-2022:193510.05.2022
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-php73-phpFixedRHSA-2021:299203.08.2021
Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUSrh-php73-phpFixedRHSA-2021:299203.08.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20->CWE-918
https://bugzilla.redhat.com/show_bug.cgi?id=1978755php: SSRF bypass in FILTER_VALIDATE_URL

EPSS

Процентиль: 50%
0.00267
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.3
ubuntu
больше 3 лет назад

In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.

CVSS3: 4.3
nvd
больше 3 лет назад

In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.

CVSS3: 4.3
debian
больше 3 лет назад

In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below ...

suse-cvrf
почти 4 года назад

Security update for php7

suse-cvrf
почти 4 года назад

Security update for php72

EPSS

Процентиль: 50%
0.00267
Низкий

5.3 Medium

CVSS3