Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-7071

Опубликовано: 15 фев. 2021
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 5
CVSS3: 5.3

Описание

In PHP versions 7.3.x below 7.3.26, 7.4.x below 7.4.14 and 8.0.0, when validating URL with functions like filter_var($url, FILTER_VALIDATE_URL), PHP will accept an URL with invalid password as valid URL. This may lead to functions that rely on URL being valid to mis-parse the URL and produce wrong data as components of the URL.

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-infra-legacy/trusty

not-affected

5.5.9+dfsg-1ubuntu4.29+esm14
esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

impish

DNE

jammy

DNE

precise/esm

ignored

end of life, was needs-triage

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

esm-infra/xenial

released

7.0.33-0ubuntu0.16.04.16+esm1
focal

DNE

groovy

DNE

hirsute

DNE

impish

DNE

jammy

DNE

Показывать по

РелизСтатусПримечание
bionic

released

7.2.24-0ubuntu0.18.04.8
devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

not-affected

7.2.24-0ubuntu0.18.04.8
esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

impish

DNE

jammy

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/focal

not-affected

7.4.3-4ubuntu2.5
focal

released

7.4.3-4ubuntu2.5
groovy

released

7.4.9-1ubuntu1.2
hirsute

not-affected

7.4.16-1ubuntu2
impish

DNE

jammy

DNE

precise/esm

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

impish

not-affected

8.0.5-1ubuntu1
jammy

DNE

precise/esm

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

not-affected

8.1.0-1
esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

groovy

DNE

hirsute

DNE

impish

DNE

jammy

not-affected

8.1.0-1
precise/esm

DNE

Показывать по

EPSS

Процентиль: 90%
0.06251
Низкий

5 Medium

CVSS2

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
redhat
больше 4 лет назад

In PHP versions 7.3.x below 7.3.26, 7.4.x below 7.4.14 and 8.0.0, when validating URL with functions like filter_var($url, FILTER_VALIDATE_URL), PHP will accept an URL with invalid password as valid URL. This may lead to functions that rely on URL being valid to mis-parse the URL and produce wrong data as components of the URL.

CVSS3: 5.3
nvd
больше 4 лет назад

In PHP versions 7.3.x below 7.3.26, 7.4.x below 7.4.14 and 8.0.0, when validating URL with functions like filter_var($url, FILTER_VALIDATE_URL), PHP will accept an URL with invalid password as valid URL. This may lead to functions that rely on URL being valid to mis-parse the URL and produce wrong data as components of the URL.

CVSS3: 5.3
debian
больше 4 лет назад

In PHP versions 7.3.x below 7.3.26, 7.4.x below 7.4.14 and 8.0.0, when ...

suse-cvrf
больше 4 лет назад

Security update for php7

suse-cvrf
больше 4 лет назад

Security update for php7

EPSS

Процентиль: 90%
0.06251
Низкий

5 Medium

CVSS2

5.3 Medium

CVSS3

Уязвимость CVE-2020-7071