CVE-2021-21707
moderate-risk
Published 2021-11-29
In PHP versions 7.3.x below 7.3.33, 7.4.x below 7.4.26 and 8.0.x below 8.0.13, certain XML parsing functions, like simplexml_load_file(), URL-decode the filename passed to them. If that filename contains URL-encoded NUL character, this may cause the function to interpret this as the end of the filename, thus interpreting the filename differently from what the user intended, which may lead it to reading a different file than intended.
Do I need to act?
-
0.56% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.3/10
Medium
NETWORK
/ LOW complexity
Affected Products (5)
References (10)
Third Party Advisory
https://security.netapp.com/advisory/ntap-20211223-0005/
Third Party Advisory
https://www.debian.org/security/2022/dsa-5082
Third Party Advisory
https://security.netapp.com/advisory/ntap-20211223-0005/
Third Party Advisory
https://www.debian.org/security/2022/dsa-5082
35
/ 100
moderate-risk
Severity
21/34 · High
Exploitability
2/34 · Minimal
Exposure
12/34 · Low