Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-1202

Опубликовано: 15 янв. 2014
Источник: redhat
CVSS2: 6.8
EPSS Средний

Описание

The WSDL/WADL import functionality in SoapUI before 4.6.4 allows remote attackers to execute arbitrary Java code via a crafted request parameter in a WSDL file.

Отчет

Not affected. Red Hat JBoss SOA Platform 4.3 and 5.3 support the SOAPClient action, which will use the SoapUI library to make calls to external web services. However, these products use SoapUI 1.7.1, while the vulnerable property expansion feature was not introduced until SoapUI 2.5. Therefore no Red Hat products are affected by this flaw.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss SOA Platform 4.3soapuiNot affected
Red Hat JBoss SOA Platform 5soapuiNot affected

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=1058582SoapUI: remote code execution when processing WSDL

EPSS

Процентиль: 95%
0.17347
Средний

6.8 Medium

CVSS2

Связанные уязвимости

nvd
около 12 лет назад

The WSDL/WADL import functionality in SoapUI before 4.6.4 allows remote attackers to execute arbitrary Java code via a crafted request parameter in a WSDL file.

github
больше 3 лет назад

Code injection via property expansion in SoapUI

EPSS

Процентиль: 95%
0.17347
Средний

6.8 Medium

CVSS2