In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: php
Published:
Updated: 2024-09-17T04:09:29.556Z
Reserved: 2021-01-04T00:00:00
Link: CVE-2021-21705

No data.

Status : Modified
Published: 2021-10-04T04:15:08.210
Modified: 2024-11-21T05:48:52.327
Link: CVE-2021-21705
