CVE-2020-7071
15.02.2021, 04:15
In PHP versions 7.3.x below 7.3.26, 7.4.x below 7.4.14 and 8.0.0, when validating URL with functions like filter_var($url, FILTER_VALIDATE_URL), PHP will accept an URL with invalid password as valid URL. This may lead to functions that rely on URL being valid to mis-parse the URL and produce wrong data as components of the URL.Enginsight
Vendor | Product | Version |
---|---|---|
php | php | 7.3.0 ≤ 𝑥 < 7.3.26 |
php | php | 7.4.0 ≤ 𝑥 < 7.4.14 |
php | php | 8.0.0 ≤ 𝑥 < 8.0.1 |
debian | debian_linux | 9.0 |
debian | debian_linux | 10.0 |
netapp | clustered_data_ontap | - |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
php5 |
| ||||||||||||||||
php7.0 |
| ||||||||||||||||
php7.2 |
| ||||||||||||||||
php7.4 |
| ||||||||||||||||
php8.0 |
| ||||||||||||||||
php8.1 |
|
Common Weakness Enumeration
References