summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorKrzysztof Opasiak <k.opasiak@samsung.com>2019-05-28 15:12:10 +0200
committerKrzysztof Opasiak <k.opasiak@samsung.com>2019-05-28 21:07:32 +0200
commit92806a527884328c9d4967bab2e5eb5677fa281a (patch)
tree025ed961a73f22f973835a54d342efa7985cbdd5
parentc984f699bb8388eadf8d9c3ca00c6a25abe2c538 (diff)
Issue OSA for OJSI-205
Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com> Change-Id: Ib89e37838c7d6c974a3361fd5cd051ae823eca81
-rw-r--r--osa/OSA-2019-025.rst38
1 files changed, 38 insertions, 0 deletions
diff --git a/osa/OSA-2019-025.rst b/osa/OSA-2019-025.rst
new file mode 100644
index 0000000..97e669f
--- /dev/null
+++ b/osa/OSA-2019-025.rst
@@ -0,0 +1,38 @@
+=========================================================
+OSA-2019-025: Unprotected APIs/UIs exposed in CLI project
+=========================================================
+
+**Date:** 2019-05-28
+
+**CVE:** CVE-2019-12130
+
+**Severity:** Important
+
+Affects
+-------
+
+* CLI: Dublin and earlier
+
+Description
+-----------
+
+Jakub Botwicz, Wojciech Rauner, Łukasz Wrochna and Radosław Żeszczuk from Samsung reported a vulnerability in ONAP CLI. By accessing port 30271, an attacker gains full access to the respective ONAP service without any authentication. All ONAP OOM setups are affected.
+
+Patches
+-------
+
+No patch for this vulnerability has been proposed yet.
+
+Credits
+-------
+
+* Jakub Botwicz from Samsung
+* Wojciech Rauner from Samsung
+* Łukasz Wrochna from Samsung
+* Radosław Żeszczuk from Samsung
+
+References
+----------
+
+* `OJSI-205 <https://jira.onap.org/browse/OJSI-205>`_
+* `CVE-2019-12130 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12130>`_