CVE-2020-7071
Published: 15 February 2021
In PHP versions 7.3.x below 7.3.26, 7.4.x below 7.4.14 and 8.0.0, when validating URL with functions like filter_var($url, FILTER_VALIDATE_URL), PHP will accept an URL with invalid password as valid URL. This may lead to functions that rely on URL being valid to mis-parse the URL and produce wrong data as components of the URL.
Notes
Author | Note |
---|---|
mdeslaur |
original fix in 7.3.26 introduced a regression and was reverted with an improved fix in 7.3.27 |
Priority
Status
Package | Release | Status |
---|---|---|
php5
Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
focal |
Does not exist
|
|
groovy |
Does not exist
|
|
hirsute |
Does not exist
|
|
impish |
Does not exist
|
|
jammy |
Does not exist
|
|
trusty |
Released
(5.5.9+dfsg-1ubuntu4.29+esm14)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
php7.0
Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
focal |
Does not exist
|
|
groovy |
Does not exist
|
|
hirsute |
Does not exist
|
|
impish |
Does not exist
|
|
jammy |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Released
(7.0.33-0ubuntu0.16.04.16+esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
php7.2
Launchpad, Ubuntu, Debian |
bionic |
Released
(7.2.24-0ubuntu0.18.04.8)
|
focal |
Does not exist
|
|
groovy |
Does not exist
|
|
hirsute |
Does not exist
|
|
impish |
Does not exist
|
|
jammy |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
php7.4
Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
focal |
Released
(7.4.3-4ubuntu2.5)
|
|
groovy |
Released
(7.4.9-1ubuntu1.2)
|
|
hirsute |
Not vulnerable
(7.4.16-1ubuntu2)
|
|
impish |
Does not exist
|
|
jammy |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Released
(7.4.14)
|
|
xenial |
Does not exist
|
|
Patches:
upstream: http://git.php.net/?p=php-src.git;a=commit;h=2d3d72412a6734e19a38ed10f385227a6238e4a6 upstream: http://git.php.net/?p=php-src.git;a=commit;h=128fca40376140c60b47a1c3750bb6435866838e upstream: http://git.php.net/?p=php-src.git;a=commit;h=434c2b1bdbed80f01f5bc6c817c9b87fef917919 upstream: http://git.php.net/?p=php-src.git;a=commit;h=4a89e726bd4d0571991dc22a9a1ad4509e8fe347 upstream: http://git.php.net/?p=php-src.git;a=commit;h=fbf8c758fe31a19f35af839b97dc261a936c9b6e upstream: http://git.php.net/?p=php-src.git;a=commit;h=9c673083cd46ee2a954a62156acbe4b6e657c048 upstream: http://git.php.net/?p=php-src.git;a=commit;h=21f861225a627cc0143dbbd7b03c2686a77409d5 |
||
php8.0
Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
focal |
Does not exist
|
|
groovy |
Does not exist
|
|
hirsute |
Does not exist
|
|
impish |
Not vulnerable
(8.0.5-1ubuntu1)
|
|
jammy |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
php8.1
Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
focal |
Does not exist
|
|
groovy |
Does not exist
|
|
hirsute |
Does not exist
|
|
impish |
Does not exist
|
|
jammy |
Not vulnerable
(8.1.0-1)
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.3 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |