diff options
author | Krzysztof Opasiak <k.opasiak@samsung.com> | 2019-05-28 15:12:10 +0200 |
---|---|---|
committer | Krzysztof Opasiak <k.opasiak@samsung.com> | 2019-05-28 21:07:32 +0200 |
commit | 92806a527884328c9d4967bab2e5eb5677fa281a (patch) | |
tree | 025ed961a73f22f973835a54d342efa7985cbdd5 | |
parent | c984f699bb8388eadf8d9c3ca00c6a25abe2c538 (diff) |
Issue OSA for OJSI-205
Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com>
Change-Id: Ib89e37838c7d6c974a3361fd5cd051ae823eca81
-rw-r--r-- | osa/OSA-2019-025.rst | 38 |
1 files changed, 38 insertions, 0 deletions
diff --git a/osa/OSA-2019-025.rst b/osa/OSA-2019-025.rst new file mode 100644 index 0000000..97e669f --- /dev/null +++ b/osa/OSA-2019-025.rst @@ -0,0 +1,38 @@ +========================================================= +OSA-2019-025: Unprotected APIs/UIs exposed in CLI project +========================================================= + +**Date:** 2019-05-28 + +**CVE:** CVE-2019-12130 + +**Severity:** Important + +Affects +------- + +* CLI: Dublin and earlier + +Description +----------- + +Jakub Botwicz, Wojciech Rauner, Łukasz Wrochna and Radosław Żeszczuk from Samsung reported a vulnerability in ONAP CLI. By accessing port 30271, an attacker gains full access to the respective ONAP service without any authentication. All ONAP OOM setups are affected. + +Patches +------- + +No patch for this vulnerability has been proposed yet. + +Credits +------- + +* Jakub Botwicz from Samsung +* Wojciech Rauner from Samsung +* Łukasz Wrochna from Samsung +* Radosław Żeszczuk from Samsung + +References +---------- + +* `OJSI-205 <https://jira.onap.org/browse/OJSI-205>`_ +* `CVE-2019-12130 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12130>`_ |