CVE-2021-21702

Updated: 2024-11-24 05:50:13.526562

Description:

In PHP versions 7.3.x below 7.3.27, 7.4.x below 7.4.15 and 8.0.x below 8.0.2, when using SOAP extension to connect to a SOAP server, a malicious SOAP server could return malformed XML data as a response that would cause PHP to access a null pointer and thus cause a crash.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x MEDIUM 5
CVSS Version 3.x HIGH 7.5

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

Debian 12 php 8.1 7.5 HIGH Already Fixed 2025-06-12 00:47:21
Debian 12 php 7.4 7.5 HIGH Already Fixed 2025-06-12 00:47:24
Debian 12 php 7.0 7.5 HIGH Already Fixed 2025-05-02 03:53:26
Debian 12 php 7.2 7.5 HIGH Already Fixed 2025-05-02 03:53:26
Debian 12 php 7.3 7.5 HIGH Already Fixed 2025-06-12 00:47:24
Debian 12 php 7.1 7.5 HIGH Already Fixed 2025-05-02 03:53:26
Debian 12 php 5.6 7.5 HIGH Already Fixed 2025-05-01 03:52:46
EL 6 php 8.0 7.5 HIGH Not Vulnerable 2022-09-16 11:02:11
EL 6 php 8.2 7.5 HIGH Not Vulnerable 2023-03-22 14:02:42
EL 6 php 7.0 7.5 HIGH Released 2022-09-16 11:02:17
Total: 124