CVE-2021-21705
Incorrect URL validation in FILTER_VALIDATE_URLIn PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.
We have discovered 922,016 live websites that are affected by CVE-2021-21705.
Contact us to get more info
Affected Software
| |
---|
Product | PHP |
Category | Programming Languages |
Vulnerable Versions | - from 7.3 before 7.3.29
- from 7.4 before 7.4.21
- from 8 before 8.0.8
|
Total Vulnerable Versions | 507 |
Vulnerable Domains | 922,016 live websites (7.62% of PHP install base) |
Common Weakness Enumeration
CWE-20 Improper Input Validation
Distribution by Website Rank
The diagram provides a graphic representation of the correlation between the occurrence of CVE-2021-21705 and the relative popularity of websites