diff options
-rw-r--r-- | osa/OSA-2019-005.rst | 42 |
1 files changed, 42 insertions, 0 deletions
diff --git a/osa/OSA-2019-005.rst b/osa/OSA-2019-005.rst new file mode 100644 index 0000000..82271b9 --- /dev/null +++ b/osa/OSA-2019-005.rst @@ -0,0 +1,42 @@ +===================================================================================== +OSA-2019-005: SDNC service allows for arbitrary code execution in sla/printAsXml form +===================================================================================== + +**Date:** 2019-05-28 + +**CVE:** CVE-2019-12123 + +**Severity:** Critical + +Affects +------- + +* SDNC: before Dublin + +Description +----------- + +Jakub Botwicz, Wojciech Rauner, Łukasz Wrochna and Radosław Żeszczuk from Samsung reported a vulnerability in SDNC. By executing sla/printAsXml with a crafted module parameter an authenticated user can execute arbitrary command. All SDNC setups which includes admportal are affected. + +Patches +------- + +* `85232 <https://gerrit.onap.org/r/#/c/oom/+/85232/>`_ + +**Warning** + +Above patch should be considered only as a temporary walkaround as it only prevents admportal from starting instead of fixing the issues. + +Credits +------- + +* Jakub Botwicz from Samsung +* Wojciech Rauner from Samsung +* Łukasz Wrochna from Samsung +* Radosław Żeszczuk from Samsung + +References +---------- + +* `OJSI-42 <https://jira.onap.org/browse/OJSI-42>`_ +* `CVE-2019-12123 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12123>`_ |