CVE Vulnerabilities

CVE-2024-5458

Insufficient Verification of Data Authenticity

Published: Jun 09, 2024 | Modified: Nov 03, 2025
CVSS 3.x
5.3
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
5.3 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

In PHP versionsĀ 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, due to a code logic error, filtering functions such as filter_var when validating URLsĀ (FILTER_VALIDATE_URL) for certain types of URLs the function will result in invalid user information (username + password part of URLs) being treated as valid user information. This may lead to the downstream code accepting invalid URLs as valid and parsing them incorrectly.

Weakness

The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.

Affected Software

NameVendorStart VersionEnd Version
PhpPhp7.3.27 (including)7.3.33 (including)
PhpPhp7.4.15 (including)7.4.33 (including)
PhpPhp8.0.2 (including)8.0.30 (including)
PhpPhp8.1.0 (including)8.1.29 (excluding)
PhpPhp8.2.0 (including)8.2.20 (excluding)
PhpPhp8.3.0 (including)8.3.8 (excluding)
Red Hat Enterprise Linux 8RedHatphp:8.2-8100020241112130045.f7998665*
Red Hat Enterprise Linux 8RedHatphp:7.4-8100020241113075828.f7998665*
Red Hat Enterprise Linux 9RedHatphp:8.2-9050020241112094217.9*
Red Hat Enterprise Linux 9RedHatphp:8.1-9050020241112144108.9*
Red Hat Enterprise Linux 9RedHatphp-0:8.0.30-2.el9*
Php5Ubuntutrusty/esm*
Php7.0Ubuntuesm-infra/xenial*
Php7.2Ubuntuesm-infra/bionic*
Php7.4Ubuntuesm-infra/focal*
Php7.4Ubuntufocal*
Php8.1Ubuntujammy*
Php8.1Ubuntuupstream*
Php8.2Ubuntumantic*
Php8.2Ubuntuupstream*
Php8.3Ubuntunoble*
Php8.3Ubuntuoracular*
Php8.3Ubuntuupstream*

References