#VU49338 Input validation error in PHP - CVE-2020-7071
Published: January 7, 2021 / Updated: October 27, 2023
PHP
PHP Group
Description
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to insufficient validation of URL performed via the "FILTER_VALIDATE_URL" setting. A remote attacker can use the "@" characters in the URL to bypass implemented filter and force the application to accept arbitrary URL instead of the defined by the option.
Example:
http://evel.website@trusted.website