summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorKrzysztof Opasiak <k.opasiak@samsung.com>2019-05-28 13:24:32 +0200
committerKrzysztof Opasiak <k.opasiak@samsung.com>2019-05-28 21:07:32 +0200
commitf58c50a7975c03de6d759665291ea0a79335dc47 (patch)
tree233c889f8ea659e895956bf472bb9bd13ad8762a
parent4e1d0f4e81c7e6775f89b943b22cb20df0bada51 (diff)
Issue OSA for OJSI-63
Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com> Change-Id: I7df4583d0ff0228ed5fb17e9945b3b0c2dfa564b
-rw-r--r--osa/OSA-2019-007.rst39
1 files changed, 39 insertions, 0 deletions
diff --git a/osa/OSA-2019-007.rst b/osa/OSA-2019-007.rst
new file mode 100644
index 0000000..3a5737d
--- /dev/null
+++ b/osa/OSA-2019-007.rst
@@ -0,0 +1,39 @@
+=================================================================================================
+OSA-2019-007: APPC exposes Jolokia interface which allows to read and overwrite an arbitrary file
+=================================================================================================
+
+**Date:** 2019-05-28
+
+**CVE:** CVE-2019-12124
+
+**Severity:** Critical
+
+Affects
+-------
+
+* APPC: before Dublin
+
+Description
+-----------
+
+Radosław Żeszczuk from Samsung reported a vulnerability in APPC. By using exposed unprotected Jolokia interface an unauthenticated attacker can read or overwrite arbitrary file. All APPC setups are affected.
+
+Patches
+-------
+
+No exact patch provided by the maintainer. Issue fixed probably fixed with ODL upgrade. (Confirmed to not be present in Dublin)
+
+**Warning**
+Dublin release is not vulnerable for this attack because the Jolokia interface is protected with basic HTTP authentication.
+Unfortunately by default weak credentials are used which can be considered to be a security risk.
+
+Credits
+-------
+
+* Radosław Żeszczuk from Samsung
+
+References
+----------
+
+* `OJSI-63 <https://jira.onap.org/browse/OJSI-63>`_
+* `CVE-2019-12124 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12124>`_