From 66d510f438f7a4dd0b6aca72e1bd8cdfbf698799 Mon Sep 17 00:00:00 2001 From: Krzysztof Opasiak Date: Tue, 28 May 2019 13:23:48 +0200 Subject: Issue OSA for OJSI-41 Signed-off-by: Krzysztof Opasiak Change-Id: Ia9691e8e317529f6b2b8d1c4d46ea814c33de43f --- osa/OSA-2019-004.rst | 42 ++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 42 insertions(+) create mode 100644 osa/OSA-2019-004.rst diff --git a/osa/OSA-2019-004.rst b/osa/OSA-2019-004.rst new file mode 100644 index 0000000..e3dfbe3 --- /dev/null +++ b/osa/OSA-2019-004.rst @@ -0,0 +1,42 @@ +=================================================================================== +OSA-2019-004: SDNC service allows for arbitrary code execution in sla/dgUpload form +=================================================================================== + +**Date:** 2019-05-28 + +**CVE:** CVE-2019-12132 + +**Severity:** Critical + +Affects +------- + +* SDNC: before Dublin + +Description +----------- + +Jakub Botwicz, Wojciech Rauner, Łukasz Wrochna and Radosław Żeszczuk from Samsungreported a vulnerability in SDNC. By executing sla/dgUpload with a crafted filename parameter an unauthenticated attacker can execute arbitrary command. All SDNC setups which includes admportal are affected + +Patches +------- + +* `85232 `_ + +**Warning** + +Above patch should be considered only as a temporary walkaround as it only prevents admportal from starting instead of fixing the issues. + +Credits +------- + +* Jakub Botwicz from Samsung +* Wojciech Rauner from Samsung +* Łukasz Wrochna from Samsung +* Radosław Żeszczuk from Samsung + +References +---------- + +* `OJSI-41 `_ +* `CVE-2019-12132 `_ -- cgit 1.2.3-korg