CVE-2021-21705

In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
phpCNA
4.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 48%
VendorProductVersion
phpphp
7.3.0 ≤
𝑥
< 7.3.29
phpphp
7.4.0 ≤
𝑥
< 7.4.21
phpphp
8.0.0 ≤
𝑥
< 8.0.8
netappclustered_data_ontap
-
oraclesd-wan_aware
8.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
php7.4
bullseye
7.4.33-1+deb11u5
fixed
bullseye (security)
7.4.33-1+deb11u6
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
php5
jammy
dne
impish
dne
hirsute
dne
groovy
dne
focal
dne
bionic
dne
xenial
dne
trusty
Fixed 5.5.9+dfsg-1ubuntu4.29+esm14
released
php7.0
jammy
dne
impish
dne
hirsute
dne
groovy
dne
focal
dne
bionic
dne
xenial
Fixed 7.0.33-0ubuntu0.16.04.16+esm1
released
trusty
dne
php7.2
jammy
dne
impish
dne
hirsute
dne
groovy
dne
focal
dne
bionic
Fixed 7.2.24-0ubuntu0.18.04.8
released
xenial
dne
trusty
dne
php7.4
jammy
dne
impish
dne
hirsute
Fixed 7.4.16-1ubuntu2.1
released
groovy
Fixed 7.4.9-1ubuntu1.2
released
focal
Fixed 7.4.3-4ubuntu2.5
released
bionic
dne
xenial
dne
trusty
dne
php8.0
jammy
dne
impish
Fixed 8.0.8-1
released
hirsute
dne
groovy
dne
focal
dne
bionic
dne
xenial
dne
trusty
dne
php8.1
jammy
not-affected
impish
dne
hirsute
dne
groovy
dne
focal
dne
bionic
dne
xenial
dne
trusty
dne