The project import functionality in SoapUI 5.3.0 allows remote attackers to execute arbitrary Java code via a crafted request parameter in a WSDL project file.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/146339/SoapUI-5.3.0-Code-Execution.html | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/146339/SoapUI-5.3.0-Code-Execution.html | Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 03:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/146339/SoapUI-5.3.0-Code-Execution.html - Third Party Advisory, VDB Entry |
Information
Published : 2018-02-19 19:29
Updated : 2024-11-21 03:16
NVD link : CVE-2017-16670
Mitre link : CVE-2017-16670
CVE.ORG link : CVE-2017-16670
JSON object : View
Products Affected
smartbear
- soapui
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')