An issue was discovered in SmartBear ReadyAPI SoapUI Pro 3.2.5. Due to unsafe use of an Java RMI based protocol in an unsafe configuration, an attacker can inject malicious serialized objects into the communication, resulting in remote code execution in the context of a client-side Network Licensing Protocol component.
References
Link | Resource |
---|---|
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-039.txt | Exploit Third Party Advisory |
https://www.syss.de/pentest-blog/ | Third Party Advisory |
http://packetstormsecurity.com/files/157772/Protection-Licensing-Toolkit-ReadyAPI-3.2.5-Code-Execution-Deserialization.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2020/May/38 | Exploit Mailing List Third Party Advisory |
Configurations
Information
Published : 2020-05-20 06:15
Updated : 2021-07-21 04:39
NVD link : CVE-2020-12835
Mitre link : CVE-2020-12835
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
smartbear
- readyapi