1 results (0.000 seconds)

CVSS: 9.3EPSS: 20%CPEs: 17EXPL: 4

14 Jan 2014 — The WSDL/WADL import functionality in SoapUI before 4.6.4 allows remote attackers to execute arbitrary Java code via a crafted request parameter in a WSDL file. La funcionalidad de importación WSDL/WADL en SoapUI anteriores a 4.6.4 permite a atacantes remotos ejecutar código Java arbitrario a través de parámetros de petición manipulados en un fichero WSDL. SoapUI versions prior to 4.6.4 suffer from a remote code execution vulnerability. • https://packetstorm.news/files/id/124773 • CWE-94: Improper Control of Generation of Code ('Code Injection') •