First published: Wed Feb 05 2020(Updated: )
An issue was discovered in SmartBear ReadyAPI through 2.8.2 and 3.0.0 and SoapUI through 5.5. When opening a project, the Groovy "Load Script" is automatically executed. This allows an attacker to execute arbitrary Groovy Language code (Java scripting language) on the victim machine by inducing it to open a malicious Project. The same issue is present in the "Save Script" function, which is executed automatically when saving a project.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SmartBear ReadyAPI | >=2.8.2<=3.0.0 | |
Smartbear Soapui | <=5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-12180.
SmartBear ReadyAPI versions up to 3.0.0 and SoapUI versions up to 5.5 are affected.
The severity level of CVE-2019-12180 is critical (7.8).
When opening a project, the Groovy "Load Script" is automatically executed, allowing an attacker to execute arbitrary Groovy Language code on the victim machine.
Update to a version beyond 3.0.0 for SmartBear ReadyAPI and beyond 5.5 for SoapUI to mitigate this vulnerability.