Code injection via property expansion in SoapUI
High severity
GitHub Reviewed
Published
May 17, 2022
to the GitHub Advisory Database
•
Updated Dec 21, 2023
Description
Published by the National Vulnerability Database
Jan 25, 2014
Published to the GitHub Advisory Database
May 17, 2022
Reviewed
Dec 21, 2023
Last updated
Dec 21, 2023
The WSDL/WADL import functionality in SoapUI before 4.6.4 allows remote attackers to execute arbitrary Java code via a crafted request parameter in a WSDL file.
References