summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorKrzysztof Opasiak <k.opasiak@samsung.com>2019-05-28 13:25:34 +0200
committerKrzysztof Opasiak <k.opasiak@samsung.com>2019-05-28 21:07:32 +0200
commit381d2385eaa2f3960c6e8659faa94be8b99a1131 (patch)
tree89b9e7402da0b8b2da4db032868014a774584542
parentb108646ac5a13b91718ec5ececb06fdf134a04c6 (diff)
Issue OSA for OJSI-78
Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com> Change-Id: I68a9e65b0d5627dc6c53458fde1291dcd26bdc77
-rw-r--r--osa/OSA-2019-012.rst35
1 files changed, 35 insertions, 0 deletions
diff --git a/osa/OSA-2019-012.rst b/osa/OSA-2019-012.rst
new file mode 100644
index 0000000..d510e48
--- /dev/null
+++ b/osa/OSA-2019-012.rst
@@ -0,0 +1,35 @@
+=======================================================================================
+OSA-2019-012: SDC exposes JDWP outside of pod which allows for arbitrary code execution
+=======================================================================================
+
+**Date:** 2019-05-28
+
+**CVE:** CVE-2019-12117
+
+**Severity:** Critical
+
+Affects
+-------
+
+* SDC: Dublin and earlier
+
+Description
+-----------
+
+Radosław Żeszczuk from Samsung reported vulnerability in SDC. By accessing port 4001 of demo-sdc-sdc-onboarding-be pod an unauthenticated attacker who already has access to pod to pod communication may execute arbitrary code inside this pod. All OOM ONAP setups which includes SDC are affected.
+
+Patches
+-------
+
+No patch for this vulnerability has been proposed yet.
+
+Credits
+-------
+
+* Radosław Żeszczuk from Samsung
+
+References
+----------
+
+* `OJSI-78 <https://jira.onap.org/browse/OJSI-78>`_
+* `CVE-2019-12117 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12117>`_