An issue was discovered in SmartBear ReadyAPI SoapUI Pro 3.2.5. Due to unsafe use of an Java RMI based protocol in an unsafe configuration, an attacker can inject malicious serialized objects into the communication, resulting in remote code execution in the context of a client-side Network Licensing Protocol component.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://www.syss.de/pentest-blog/ | third party advisory |
http://seclists.org/fulldisclosure/2020/May/38 | mailing list exploit third party advisory |
http://packetstormsecurity.com/files/157772/Protection-Licensing-Toolkit-ReadyAPI-3.2.5-Code-Execution-Deserialization.html | exploit vdb entry third party advisory |
https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-039.txt | third party advisory exploit |