From 381d2385eaa2f3960c6e8659faa94be8b99a1131 Mon Sep 17 00:00:00 2001 From: Krzysztof Opasiak Date: Tue, 28 May 2019 13:25:34 +0200 Subject: Issue OSA for OJSI-78 Signed-off-by: Krzysztof Opasiak Change-Id: I68a9e65b0d5627dc6c53458fde1291dcd26bdc77 --- osa/OSA-2019-012.rst | 35 +++++++++++++++++++++++++++++++++++ 1 file changed, 35 insertions(+) create mode 100644 osa/OSA-2019-012.rst diff --git a/osa/OSA-2019-012.rst b/osa/OSA-2019-012.rst new file mode 100644 index 0000000..d510e48 --- /dev/null +++ b/osa/OSA-2019-012.rst @@ -0,0 +1,35 @@ +======================================================================================= +OSA-2019-012: SDC exposes JDWP outside of pod which allows for arbitrary code execution +======================================================================================= + +**Date:** 2019-05-28 + +**CVE:** CVE-2019-12117 + +**Severity:** Critical + +Affects +------- + +* SDC: Dublin and earlier + +Description +----------- + +Radosław Żeszczuk from Samsung reported vulnerability in SDC. By accessing port 4001 of demo-sdc-sdc-onboarding-be pod an unauthenticated attacker who already has access to pod to pod communication may execute arbitrary code inside this pod. All OOM ONAP setups which includes SDC are affected. + +Patches +------- + +No patch for this vulnerability has been proposed yet. + +Credits +------- + +* Radosław Żeszczuk from Samsung + +References +---------- + +* `OJSI-78 `_ +* `CVE-2019-12117 `_ -- cgit 1.2.3-korg