Description
In PHP versions 7.3.x below 7.3.27, 7.4.x below 7.4.15 and 8.0.x below 8.0.2, when using SOAP extension to connect to a SOAP server, a malicious SOAP server could return malformed XML data as a response that would cause PHP to access a null pointer and thus cause a crash.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2708-1 | php7.0 security update |
Debian DSA |
DSA-4856-1 | php7.3 security update |
EUVD |
EUVD-2021-8874 | In PHP versions 7.3.x below 7.3.27, 7.4.x below 7.4.15 and 8.0.x below 8.0.2, when using SOAP extension to connect to a SOAP server, a malicious SOAP server could return malformed XML data as a response that would cause PHP to access a null pointer and thus cause a crash. |
Ubuntu USN |
USN-5006-1 | PHP vulnerabilities |
Ubuntu USN |
USN-5006-2 | PHP vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: php
Published:
Updated: 2024-09-16T17:34:26.201Z
Reserved: 2021-01-04T00:00:00.000Z
Link: CVE-2021-21702
No data.
Status : Modified
Published: 2021-02-15T04:15:12.673
Modified: 2024-11-21T05:48:51.847
Link: CVE-2021-21702
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN