summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorKrzysztof Opasiak <k.opasiak@samsung.com>2019-05-28 15:11:23 +0200
committerKrzysztof Opasiak <k.opasiak@samsung.com>2019-05-28 21:07:32 +0200
commit341339b2d12fdaff99f2e72e5400ac6141f5d253 (patch)
tree7c0755488a33eec3dc2d740e23d0668d99ec805c
parent7124f74042e7e27987c32c86a85210f3a7b5d2d2 (diff)
Issue OSA for OJSI-203
Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com> Change-Id: I293618fe51440b38e04e51e6d58ca788bd99a93a
-rw-r--r--osa/OSA-2019-023.rst38
1 files changed, 38 insertions, 0 deletions
diff --git a/osa/OSA-2019-023.rst b/osa/OSA-2019-023.rst
new file mode 100644
index 0000000..9c7e9eb
--- /dev/null
+++ b/osa/OSA-2019-023.rst
@@ -0,0 +1,38 @@
+========================================================
+OSA-2019-023: Unprotected APIs/UIs exposed in SO project
+========================================================
+
+**Date:** 2019-05-28
+
+**CVE:** CVE-2019-12128
+
+**Severity:** Important
+
+Affects
+-------
+
+* SO: Dublin and earlier
+
+Description
+-----------
+
+Jakub Botwicz, Wojciech Rauner, Łukasz Wrochna and Radosław Żeszczuk from Samsung reported a vulnerability in ONAP SO. By accessing port 30224, an attacker gains full access to the respective ONAP service without any authentication. All ONAP OOM setups are affected.
+
+Patches
+-------
+
+No patch for this vulnerability has been proposed yet.
+
+Credits
+-------
+
+* Jakub Botwicz from Samsung
+* Wojciech Rauner from Samsung
+* Łukasz Wrochna from Samsung
+* Radosław Żeszczuk from Samsung
+
+References
+----------
+
+* `OJSI-203 <https://jira.onap.org/browse/OJSI-203>`_
+* `CVE-2019-12128 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12128>`_