The WSDL/WADL import functionality in SoapUI prior to 4.6.4 allows remote malicious users to execute arbitrary Java code via a crafted request parameter in a WSDL file.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
smartbear soapui |
||
smartbear soapui 4.6.2 |
||
smartbear soapui 4.0 |
||
eviware soapui 3.5.1 |
||
eviware soapui 3.5 |
||
smartbear soapui 4.5.1 |
||
smartbear soapui 4.5 |
||
eviware soapui 3.0.1 |
||
eviware soapui 2.5.1 |
||
smartbear soapui 4.0.1 |
||
eviware soapui 3.6.1 |
||
eviware soapui 3.6 |
||
smartbear soapui 4.6.1 |
||
smartbear soapui 4.6.0 |
||
smartbear soapui 4.5.2 |