CVE-2024-7565

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on SMARTBEAR SoapUI installations through directory traversal in the unpackageAll function. Attackers can exploit this by tricking users into visiting malicious web pages or opening malicious files. The vulnerability affects users who process untrusted content with vulnerable SoapUI versions.

💻 Affected Systems

Products:
  • SMARTBEAR SoapUI
Versions: Versions prior to the fix in release notes
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations that process XML or SOAP files from untrusted sources are vulnerable. The vulnerability requires user interaction to trigger.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, lateral movement, or ransomware deployment.

🟠

Likely Case

Local file system access and arbitrary code execution within the user's context, enabling data exfiltration or installation of persistent malware.

🟢

If Mitigated

Limited impact if proper application sandboxing and user privilege restrictions are in place, though some data exposure may still occur.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (opening malicious file or visiting malicious page). The vulnerability is well-documented in ZDI advisory ZDI-24-1100.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check latest release notes at https://www.soapui.org/downloads/latest-release/release-notes/

Vendor Advisory: https://www.soapui.org/downloads/latest-release/release-notes/

Restart Required: Yes

Instructions:

1. Visit https://www.soapui.org/downloads/latest-release/ 2. Download and install the latest version 3. Restart SoapUI 4. Verify the update was successful

🔧 Temporary Workarounds

Restrict file processing

all

Only process XML/SOAP files from trusted sources and avoid opening files from unknown origins.

Run with limited privileges

all

Run SoapUI with a non-administrative user account to limit potential damage from exploitation.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized binaries
  • Deploy endpoint detection and response (EDR) solutions to monitor for suspicious file operations

🔍 How to Verify

Check if Vulnerable:

Check your SoapUI version against the latest release notes. If using a version prior to the fix mentioned in release notes, you are vulnerable.

Check Version:

In SoapUI: Help → About SoapUI

Verify Fix Applied:

Update to the latest version from the official SoapUI website and confirm the version number matches or exceeds the patched version.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file operations outside expected directories
  • Suspicious process creation from SoapUI

Network Indicators:

  • Unexpected outbound connections from SoapUI process

SIEM Query:

Process creation where parent process contains 'soapui' and child process is suspicious or unexpected

🔗 References

📤 Share & Export