CVE-2021-21707Improper Handling of Invalid Use of Special Elements in Group PHP

Severity
5.3MEDIUMNVD
EPSS
0.6%
top 31.59%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 29
Latest updateOct 15

Description

In PHP versions 7.3.x below 7.3.33, 7.4.x below 7.4.26 and 8.0.x below 8.0.13, certain XML parsing functions, like simplexml_load_file(), URL-decode the filename passed to them. If that filename contains URL-encoded NUL character, this may cause the function to interpret this as the end of the filename, thus interpreting the filename differently from what the user intended, which may lead it to reading a different file than intended.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages3 packages

NVDphp/php7.3.07.3.33+2
CVEListV5php_group/php7.3.x7.3.33+2
NVDtenable/tenable.sc< 5.21.0

Also affects: Debian Linux 10.0, 11.0

Patches

🔴Vulnerability Details

5
OSV
php7.2, php7.4 vulnerabilities2022-03-03
OSV
php7.0 vulnerabilities2022-02-22
GHSA
GHSA-qh78-qfw9-93x9: In PHP versions 72021-11-30
OSV
CVE-2021-21707: In PHP versions 72021-11-29
CVEList
Special characters break path parsing in XML functions2021-11-29

📋Vendor Advisories

7
Oracle
Oracle Oracle Communications Risk Matrix: Platform (PHP) — CVE-2021-217072022-10-15
Ubuntu
PHP vulnerabilities2022-03-07
Ubuntu
PHP vulnerabilities2022-03-03
Ubuntu
PHP vulnerabilities2022-02-22
Red Hat
php: Special character breaks path in xml parsing2021-11-15
CVE-2021-21707 — PHP Group PHP vulnerability | cvebase