The project import functionality in SoapUI 5.3.0 allows remote attackers to execute arbitrary Java code via a crafted request parameter in a WSDL project file.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/146339/SoapUI-5.3.0-Code-Execution.html | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2018-02-19 11:29
Updated : 2018-03-19 08:26
NVD link : CVE-2017-16670
Mitre link : CVE-2017-16670
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
smartbear
- soapui