Vulnerability Name: | CVE-2020-12835 (CCN-182142) | ||||||||||||
Assigned: | 2020-05-19 | ||||||||||||
Published: | 2020-05-19 | ||||||||||||
Updated: | 2021-07-21 | ||||||||||||
Summary: | An issue was discovered in SmartBear ReadyAPI SoapUI Pro 3.2.5. Due to unsafe use of an Java RMI based protocol in an unsafe configuration, an attacker can inject malicious serialized objects into the communication, resulting in remote code execution in the context of a client-side Network Licensing Protocol component. | ||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.6 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
8.6 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:R)
| ||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-74 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-12835 Source: MISC Type: Exploit, Third Party Advisory, VDB Entry http://packetstormsecurity.com/files/157772/Protection-Licensing-Toolkit-ReadyAPI-3.2.5-Code-Execution-Deserialization.html Source: FULLDISC Type: Exploit, Mailing List, Third Party Advisory 20200519 [SYSS-2019-039] Smartbear ReadyAPI/SoapUI Pro/jProductivity Licensing Unsafe Deserialization Source: XF Type: UNKNOWN smartbear-cve202012835-code-exec(182142) Source: CCN Type: Packet Storm Security [05-19-2020] Protection Licensing Toolkit ReadyAPI 3.2.5 Code Execution / Deserialization Source: CCN Type: Full-Disclosure Mailing List, Tue, 19 May 2020 10:04:52 +0200 [SYSS-2019-039] Smartbear ReadyAPI/SoapUI Pro/jProductivity Licensing Unsafe Deserialization Source: CCN Type: Smartbear Web site Protection Licensing Toolkit ReadyAPI Source: MISC Type: Exploit, Third Party Advisory https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2019-039.txt Source: MISC Type: Third Party Advisory https://www.syss.de/pentest-blog/ | ||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||
BACK |