The WSDL/WADL import functionality in SoapUI before 4.6.4 allows remote attackers to execute arbitrary Java code via a crafted request parameter in a WSDL file.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-c2fp-mpmm-cqxv Code injection via property expansion in SoapUI
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T09:34:40.758Z

Reserved: 2014-01-07T00:00:00

Link: CVE-2014-1202

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-01-25T01:55:05.973

Modified: 2025-04-11T00:51:21.963

Link: CVE-2014-1202

cve-icon Redhat

Severity : Important

Publid Date: 2014-01-15T00:00:00Z

Links: CVE-2014-1202 - Bugzilla

cve-icon OpenCVE Enrichment

No data.