First published: Mon Nov 15 2021(Updated: )
Fixed bug (special character is breaking the path in xml function). (CVE-2021-21707)
Credit: security@php.net security@php.net
Affected Software | Affected Version | How to fix |
---|---|---|
PHP PHP | >=7.3.0<7.3.33 | |
PHP PHP | >=7.4.0<7.4.26 | |
PHP PHP | >=8.0.0<8.0.13 | |
NetApp Clustered Data ONTAP | ||
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Tenable Tenable.sc | <5.21.0 | |
PHP PHP | <8.0.13 | 8.0.13 |
debian/php7.4 | 7.4.33-1+deb11u5 7.4.33-1+deb11u7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this bug is CVE-2021-21707.
The severity level of CVE-2021-21707 is medium with a severity value of 5.3.
PHP versions 7.3.x below 7.3.33, 7.4.x below 7.4.26, and 8.0.x below 8.0.13 are affected by CVE-2021-21707.
CVE-2021-21707 can cause certain XML parsing functions in PHP to interpret an URL-encoded NUL character as the end of the filename, potentially leading to file path manipulation.
More information about CVE-2021-21707 can be found at the following references: [Mitre](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21707), [Ubuntu Security Notices - USN-5300-1](https://ubuntu.com/security/notices/USN-5300-1), [Ubuntu Security Notices - USN-5300-2](https://ubuntu.com/security/notices/USN-5300-2).