vulnerability

Ubuntu: (Multiple Advisories) (CVE-2021-21705): PHP vulnerabilities

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Jul 7, 2021
Added
Jul 8, 2021
Modified
Apr 16, 2026

Description

In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.

Solutions

ubuntu-pro-upgrade-libapache2-mod-php5ubuntu-pro-upgrade-libapache2-mod-php7-0ubuntu-pro-upgrade-php5-cgiubuntu-pro-upgrade-php5-cliubuntu-pro-upgrade-php5-fpmubuntu-pro-upgrade-php7-0-cgiubuntu-pro-upgrade-php7-0-cliubuntu-pro-upgrade-php7-0-fpmubuntu-upgrade-libapache2-mod-php7-2ubuntu-upgrade-libapache2-mod-php7-4ubuntu-upgrade-php7-2-cgiubuntu-upgrade-php7-2-cliubuntu-upgrade-php7-2-fpmubuntu-upgrade-php7-4-cgiubuntu-upgrade-php7-4-cliubuntu-upgrade-php7-4-fpm
Title
Rapid7 Labs

2026 Global Threat Landscape Report

The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.