summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorKrzysztof Opasiak <k.opasiak@samsung.com>2019-05-28 15:11:11 +0200
committerKrzysztof Opasiak <k.opasiak@samsung.com>2019-05-28 21:07:32 +0200
commit7124f74042e7e27987c32c86a85210f3a7b5d2d2 (patch)
treeccc45d39c0bd21a086d06c091f76bf874602f4c2
parent99534c5f4e936113f8746f3ac313bd4457c00d48 (diff)
Issue OSA for OJSI-202
Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com> Change-Id: I699f0b96806525a58a60a0fe69aae2583163644a
-rw-r--r--osa/OSA-2019-022.rst38
1 files changed, 38 insertions, 0 deletions
diff --git a/osa/OSA-2019-022.rst b/osa/OSA-2019-022.rst
new file mode 100644
index 0000000..1ec9b03
--- /dev/null
+++ b/osa/OSA-2019-022.rst
@@ -0,0 +1,38 @@
+=========================================================
+OSA-2019-022: Unprotected APIs/UIs exposed in OOM project
+=========================================================
+
+**Date:** 2019-05-28
+
+**CVE:** CVE-2019-12127
+
+**Severity:** Important
+
+Affects
+-------
+
+* OOM: Dublin and earlier
+
+Description
+-----------
+
+Jakub Botwicz, Wojciech Rauner, Łukasz Wrochna and Radosław Żeszczuk from Samsung reported a vulnerability in ONAP OOM. By accessing port 30270, an attacker gains full access to the respective ONAP service without any authentication. All ONAP OOM setups are affected.
+
+Patches
+-------
+
+No patch for this vulnerability has been proposed yet.
+
+Credits
+-------
+
+* Jakub Botwicz from Samsung
+* Wojciech Rauner from Samsung
+* Łukasz Wrochna from Samsung
+* Radosław Żeszczuk from Samsung
+
+References
+----------
+
+* `OJSI-202 <https://jira.onap.org/browse/OJSI-202>`_
+* `CVE-2019-12127 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12127>`_