In PHP versions 7.3.x below 7.3.27, 7.4.x below 7.4.15 and 8.0.x below 8.0.2, when using SOAP extension to connect to a SOAP server, a malicious SOAP server could return malformed XML data as a response that would cause PHP to access a null pointer and thus cause a crash.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2708-1 | php7.0 security update |
Debian DSA |
DSA-4856-1 | php7.3 security update |
EUVD |
EUVD-2021-8874 | In PHP versions 7.3.x below 7.3.27, 7.4.x below 7.4.15 and 8.0.x below 8.0.2, when using SOAP extension to connect to a SOAP server, a malicious SOAP server could return malformed XML data as a response that would cause PHP to access a null pointer and thus cause a crash. |
Ubuntu USN |
USN-5006-1 | PHP vulnerabilities |
Ubuntu USN |
USN-5006-2 | PHP vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: php
Published:
Updated: 2024-09-16T17:34:26.201Z
Reserved: 2021-01-04T00:00:00
Link: CVE-2021-21702
No data.
Status : Modified
Published: 2021-02-15T04:15:12.673
Modified: 2024-11-21T05:48:51.847
Link: CVE-2021-21702
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN