5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
0.001 Low
EPSS
Percentile
39.9%
In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below
8.0.8, when using URL validation functionality via filter_var() function
with FILTER_VALIDATE_URL parameter, an URL with invalid password field can
be accepted as valid. This can lead to the code incorrectly parsing the URL
and potentially leading to other security implications - like contacting a
wrong server or making a wrong access decision.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 14.04 | noarch | php5 | < 5.5.9+dfsg-1ubuntu4.29+esm14 | UNKNOWN |
ubuntu | 16.04 | noarch | php7.0 | < 7.0.33-0ubuntu0.16.04.16+esm1 | UNKNOWN |
ubuntu | 18.04 | noarch | php7.2 | < 7.2.24-0ubuntu0.18.04.8 | UNKNOWN |
ubuntu | 20.04 | noarch | php7.4 | < 7.4.3-4ubuntu2.5 | UNKNOWN |
ubuntu | 20.10 | noarch | php7.4 | < 7.4.9-1ubuntu1.2 | UNKNOWN |
ubuntu | 21.04 | noarch | php7.4 | < 7.4.16-1ubuntu2.1 | UNKNOWN |
ubuntu | 21.10 | noarch | php8.0 | < 8.0.8-1 | UNKNOWN |
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
0.001 Low
EPSS
Percentile
39.9%