Description
In PHP versions 7.3.x below 7.3.26, 7.4.x below 7.4.14 and 8.0.0, when validating URL with functions like filter_var($url, FILTER_VALIDATE_URL), PHP will accept an URL with invalid password as valid URL. This may lead to functions that rely on URL being valid to mis-parse the URL and produce wrong data as components of the URL.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2708-1 | php7.0 security update |
Debian DLA |
DLA-3833-1 | php7.3 security update |
Debian DLA |
DLA-3920-1 | php7.4 security update |
Debian DSA |
DSA-4856-1 | php7.3 security update |
EUVD |
EUVD-2020-28205 | In PHP versions 7.3.x below 7.3.26, 7.4.x below 7.4.14 and 8.0.0, when validating URL with functions like filter_var($url, FILTER_VALIDATE_URL), PHP will accept an URL with invalid password as valid URL. This may lead to functions that rely on URL being valid to mis-parse the URL and produce wrong data as components of the URL. |
Ubuntu USN |
USN-5006-1 | PHP vulnerabilities |
Ubuntu USN |
USN-5006-2 | PHP vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: php
Published:
Updated: 2024-09-16T17:28:54.077Z
Reserved: 2020-01-15T00:00:00.000Z
Link: CVE-2020-7071
No data.
Status : Modified
Published: 2021-02-15T04:15:12.563
Modified: 2024-11-21T05:36:37.180
Link: CVE-2020-7071
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN