Description
In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2708-1 | php7.0 security update |
Debian DSA |
DSA-4935-1 | php7.3 security update |
EUVD |
EUVD-2021-8877 | In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision. |
Ubuntu USN |
USN-5006-1 | PHP vulnerabilities |
Ubuntu USN |
USN-5006-2 | PHP vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: php
Published:
Updated: 2024-09-17T04:09:29.556Z
Reserved: 2021-01-04T00:00:00.000Z
Link: CVE-2021-21705
No data.
Status : Modified
Published: 2021-10-04T04:15:08.210
Modified: 2024-11-21T05:48:52.327
Link: CVE-2021-21705
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN