CVE-2021-21702

Name
CVE-2021-21702
Description
In PHP versions 7.3.x below 7.3.27, 7.4.x below 7.4.15 and 8.0.x below 8.0.2, when using SOAP extension to connect to a SOAP server, a malicious SOAP server could return malformed XML data as a response that would cause PHP to access a null pointer and thus cause a crash.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Issue Tracking https://bugs.php.net/bug.php?id=80672
Third Party Advisory https://www.debian.org/security/2021/dsa-4856
Third Party Advisory https://security.netapp.com/advisory/ntap-20210312-0005/
GENTOO https://security.gentoo.org/glsa/202105-23
Mailing List https://lists.debian.org/debian-lts-announce/2021/07/msg00008.html
Third Party Advisory https://www.tenable.com/security/tns-2021-14
MISC https://www.oracle.com/security-alerts/cpuoct2021.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:php:php:*:*:*:*:*:*:*:* php >= 7.3.0 < 7.3.27
cpe:2.3:a:php:php:*:*:*:*:*:*:*:* php >= 7.4.0 < 7.4.15
cpe:2.3:a:php:php:*:*:*:*:*:*:*:* php >= 8.0.0 < 8.0.2

Vulnerable and fixed packages

Source package Branch Version Maintainer Status