Unrated severityNVD Advisory· Published Oct 4, 2021· Updated Sep 17, 2024
Incorrect URL validation in FILTER_VALIDATE_URL
CVE-2021-21705
Description
In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- security.gentoo.org/glsa/202209-20mitrevendor-advisoryx_refsource_GENTOO
- bugs.php.net/bug.phpmitrex_refsource_MISC
- security.netapp.com/advisory/ntap-20211029-0006/mitrex_refsource_CONFIRM
- www.oracle.com/security-alerts/cpujan2022.htmlmitrex_refsource_MISC
News mentions
0No linked articles in our index yet.