First published: Thu Jun 06 2024(Updated: )
Fixed bug GHSA-w8qr-v226-r27w (Filter bypass in filter_var FILTER_VALIDATE_URL). (CVE-2024-5458)
Credit: security@php.net security@php.net
Affected Software | Affected Version | How to fix |
---|---|---|
debian/php7.4 | <=7.4.33-1+deb11u5 | |
debian/php8.2 | 8.2.20-1~deb12u1 8.2.23-1 | |
redhat/php | <8.1.29 | 8.1.29 |
redhat/php | <8.2.20 | 8.2.20 |
redhat/php | <8.3.8 | 8.3.8 |
PHP | <8.2.20 | 8.2.20 |
PHP | >=7.3.27<=7.3.33 | |
PHP | >=7.4.15<=7.4.33 | |
PHP | >=8.0.2<=8.0.30 | |
PHP | >=8.1.0<8.1.29 | |
PHP | >=8.2.0<8.2.20 | |
PHP | >=8.3.0<8.3.8 | |
Fedora | =40 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5458 has a high severity due to the potential for filter bypass vulnerabilities in PHP's URL validation.
CVE-2024-5458 affects PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, and 8.3.* before 8.3.8.
To fix CVE-2024-5458, upgrade to PHP version 8.1.29, 8.2.20, or 8.3.8 or later.
CVE-2024-5458 is a filter bypass vulnerability related to URL validation functions in PHP.
There is no official workaround for CVE-2024-5458; the recommended action is to update to a secure version.