The WSDL/WADL import functionality in SoapUI before 4.6.4 allows remote attackers to execute arbitrary Java code via a crafted request parameter in a WSDL file.
References
Configurations
Configuration 1 (hide)
|
Information
Published : 2014-01-24 17:55
Updated : 2014-01-27 20:57
NVD link : CVE-2014-1202
Mitre link : CVE-2014-1202
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
smartbear
- soapui
eviware
- soapui