In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://bugs.php.net/bug.php?id=81122 | issue tracking patch vendor advisory exploit |
https://www.oracle.com/security-alerts/cpujan2022.html | patch vendor advisory |
https://security.netapp.com/advisory/ntap-20211029-0006/ | third party advisory |
https://security.gentoo.org/glsa/202209-20 | third party advisory vendor advisory |