In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2708-1 | php7.0 security update |
Debian DSA |
DSA-4935-1 | php7.3 security update |
EUVD |
EUVD-2021-8877 | In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision. |
Ubuntu USN |
USN-5006-1 | PHP vulnerabilities |
Ubuntu USN |
USN-5006-2 | PHP vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: php
Published:
Updated: 2024-09-17T04:09:29.556Z
Reserved: 2021-01-04T00:00:00
Link: CVE-2021-21705
No data.
Status : Modified
Published: 2021-10-04T04:15:08.210
Modified: 2024-11-21T05:48:52.327
Link: CVE-2021-21705
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN