Description: In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications – like contacting a wrong server or making a wrong access decision.
CVE-2021-21705
Published Date: 2021-10-04T04:15Z
Last Modified: 2022-10-29T02:50Z
CVSS Score: 5.3 (MEDIUM)
EPSS Score: 0.09%
Risk Score: 3.71 (MEDIUM)
Risk Score based on CVSS score and EPSS. This score is for reference purposes and is not internationally recognized.
CVSS:
5.3 |
EPSS:
0.09%
Mitre ATT&CK Technical v15.1
T1583.004 – Server
T1584.004 – Server
T1053.002 – At
Technical Analysis & Mitigation Measures
Reference Links
Vendor - Produce - Version
php - php, php - php, php - php, clustered_data_ontap - netapp, sd-wan_aware - oracle
Disclaimer
The content on this website is automatically sourced from external websites such as the National Vulnerability Database (NVD), GitHub, and other security-related sources. This content is for reference purposes only, and we are not responsible for the accuracy or integrity of the information linked or displayed from these sources.