CVE-2018-20580

HIGH

Smartbear Readyapi - Improper Input Validation

Title source: rule
STIX 2.1

Description

The WSDL import functionality in SmartBear ReadyAPI 2.5.0 and 2.6.0 allows remote attackers to execute arbitrary Java code via a crafted request parameter in a WSDL file.

Exploits (2)

exploitdb WORKING POC
by Gilson Camelo · textwebappsmultiple
https://www.exploit-db.com/exploits/46796
nomisec WRITEUP 2 stars
by gscamelo · poc
https://github.com/gscamelo/CVE-2018-20580

References (5)

Core 5
Core References
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/46796/
Exploit, Third Party Advisory x_refsource_misc
https://github.com/gscamelo/CVE-2018-20580
Various Sources x_refsource_misc
https://vimeo.com/332912402
Various Sources x_refsource_misc
https://vimeo.com/332912473

Scores

CVSS v3 8.8
EPSS 0.2975
EPSS Percentile 96.7%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Details

CWE
CWE-20
Status published
Products (2)
smartbear/readyapi 2.5.0
smartbear/readyapi 2.6.0
Published May 03, 2019
Tracked Since Feb 18, 2026