Description
The project import functionality in SoapUI 5.3.0 allows remote attackers to execute arbitrary Java code via a crafted request parameter in a WSDL project file.
Remediation
References
http://packetstormsecurity.com/files/146339/SoapUI-5.3.0-Code-Execution.html
Related Vulnerabilities
CVE-2020-9480 Vulnerability in maven package org.apache.spark:spark-network-shuffle_2.11
CVE-2018-20433 Vulnerability in maven package c3p0:c3p0
CVE-2022-26112 Vulnerability in maven package org.apache.pinot:pinot-broker
CVE-2021-21695 Vulnerability in maven package org.jenkins-ci.main:jenkins-core
CVE-2023-30526 Vulnerability in maven package org.jenkins-ci.plugins:reportportal