diff options
author | Krzysztof Opasiak <k.opasiak@samsung.com> | 2019-05-28 15:11:23 +0200 |
---|---|---|
committer | Krzysztof Opasiak <k.opasiak@samsung.com> | 2019-05-28 21:07:32 +0200 |
commit | 341339b2d12fdaff99f2e72e5400ac6141f5d253 (patch) | |
tree | 7c0755488a33eec3dc2d740e23d0668d99ec805c | |
parent | 7124f74042e7e27987c32c86a85210f3a7b5d2d2 (diff) |
Issue OSA for OJSI-203
Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com>
Change-Id: I293618fe51440b38e04e51e6d58ca788bd99a93a
-rw-r--r-- | osa/OSA-2019-023.rst | 38 |
1 files changed, 38 insertions, 0 deletions
diff --git a/osa/OSA-2019-023.rst b/osa/OSA-2019-023.rst new file mode 100644 index 0000000..9c7e9eb --- /dev/null +++ b/osa/OSA-2019-023.rst @@ -0,0 +1,38 @@ +======================================================== +OSA-2019-023: Unprotected APIs/UIs exposed in SO project +======================================================== + +**Date:** 2019-05-28 + +**CVE:** CVE-2019-12128 + +**Severity:** Important + +Affects +------- + +* SO: Dublin and earlier + +Description +----------- + +Jakub Botwicz, Wojciech Rauner, Łukasz Wrochna and Radosław Żeszczuk from Samsung reported a vulnerability in ONAP SO. By accessing port 30224, an attacker gains full access to the respective ONAP service without any authentication. All ONAP OOM setups are affected. + +Patches +------- + +No patch for this vulnerability has been proposed yet. + +Credits +------- + +* Jakub Botwicz from Samsung +* Wojciech Rauner from Samsung +* Łukasz Wrochna from Samsung +* Radosław Żeszczuk from Samsung + +References +---------- + +* `OJSI-203 <https://jira.onap.org/browse/OJSI-203>`_ +* `CVE-2019-12128 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12128>`_ |