Files
CVEs-PoC/2021/CVE-2021-21702.md
T
2024-06-18 02:51:15 +02:00

18 lines
801 B
Markdown

### [CVE-2021-21702](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21702)
![](https://img.shields.io/static/v1?label=Product&message=PHP&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=7.3.x%3C%207.3.27%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-476%20NULL%20Pointer%20Dereference&color=brighgreen)
### Description
In PHP versions 7.3.x below 7.3.27, 7.4.x below 7.4.15 and 8.0.x below 8.0.2, when using SOAP extension to connect to a SOAP server, a malicious SOAP server could return malformed XML data as a response that would cause PHP to access a null pointer and thus cause a crash.
### POC
#### Reference
- https://www.oracle.com/security-alerts/cpuoct2021.html
#### Github
No PoCs found on GitHub currently.