An issue was discovered in SmartBear ReadyAPI SoapUI Pro 3.2.5. Due to unsafe use of an Java RMI based protocol in an unsafe configuration, an attacker can inject malicious serialized objects into the communication, resulting in remote code execution in the context of a client-side Network Licensing Protocol component.
References
| Link | Resource |
|---|---|
| https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-039.txt | Exploit Third Party Advisory |
| https://www.syss.de/pentest-blog/ | Third Party Advisory |
| http://packetstormsecurity.com/files/157772/Protection-Licensing-Toolkit-ReadyAPI-3.2.5-Code-Execution-Deserialization.html | Exploit Third Party Advisory VDB Entry |
| http://seclists.org/fulldisclosure/2020/May/38 | Exploit Mailing List Third Party Advisory |
Configurations
Information
Published : 2020-05-20 13:15
Updated : 2021-07-21 11:39
NVD link : CVE-2020-12835
Mitre link : CVE-2020-12835
JSON object : View
Products Affected
smartbear
- readyapi
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
