ALT-PU-2021-2809-1
Closed vulnerabilities
BDU:2021-03559
Уязвимость модуля pdo_firebase интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03703
Уязвимость функции php_url_parse_ex() интерпретатора языка программирования PHP, позволяющая нарушителю осуществить SSRF-атаку
Modified: 2024-11-21
CVE-2021-21704
In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using Firebird PDO driver extension, a malicious database server could cause crashes in various database functions, such as getAttribute(), execute(), fetch() and others by returning invalid response data that is not parsed correctly by the driver. This can result in crashes, denial of service or potentially memory corruption.
- https://bugs.php.net/bug.php?id=76448
- https://bugs.php.net/bug.php?id=76448
- https://bugs.php.net/bug.php?id=76449
- https://bugs.php.net/bug.php?id=76449
- https://bugs.php.net/bug.php?id=76450
- https://bugs.php.net/bug.php?id=76450
- https://bugs.php.net/bug.php?id=76452
- https://bugs.php.net/bug.php?id=76452
- GLSA-202209-20
- GLSA-202209-20
- https://security.netapp.com/advisory/ntap-20211029-0006/
- https://security.netapp.com/advisory/ntap-20211029-0006/
Modified: 2024-11-21
CVE-2021-21705
In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.
- https://bugs.php.net/bug.php?id=81122
- https://bugs.php.net/bug.php?id=81122
- GLSA-202209-20
- GLSA-202209-20
- https://security.netapp.com/advisory/ntap-20211029-0006/
- https://security.netapp.com/advisory/ntap-20211029-0006/
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html