vulnerability
Oracle Solaris 11: CVE-2021-21705 (11.4 SRU 38.101.6)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:P/A:N) | Nov 17, 2021 | Nov 17, 2021 | Feb 17, 2022 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Nov 17, 2021
Added
Nov 17, 2021
Modified
Feb 17, 2022
Description
In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.
Solutions
oracle-solaris-11-4-upgrade-web-php-73-7-3-30-11-4-38-0-1-101-3oracle-solaris-11-4-upgrade-web-php-74-7-4-23-11-4-38-0-1-101-3oracle-solaris-11-4-upgrade-web-php-80-8-0-10-11-4-38-0-1-101-3
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.