vulnerability
Ubuntu: (Multiple Advisories) (CVE-2021-21705): PHP vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:P/A:N) | Jul 7, 2021 | Jul 8, 2021 | Apr 16, 2026 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Jul 7, 2021
Added
Jul 8, 2021
Modified
Apr 16, 2026
Description
In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.
Solutions
ubuntu-pro-upgrade-libapache2-mod-php5ubuntu-pro-upgrade-libapache2-mod-php7-0ubuntu-pro-upgrade-php5-cgiubuntu-pro-upgrade-php5-cliubuntu-pro-upgrade-php5-fpmubuntu-pro-upgrade-php7-0-cgiubuntu-pro-upgrade-php7-0-cliubuntu-pro-upgrade-php7-0-fpmubuntu-upgrade-libapache2-mod-php7-2ubuntu-upgrade-libapache2-mod-php7-4ubuntu-upgrade-php7-2-cgiubuntu-upgrade-php7-2-cliubuntu-upgrade-php7-2-fpmubuntu-upgrade-php7-4-cgiubuntu-upgrade-php7-4-cliubuntu-upgrade-php7-4-fpm
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.