summaryrefslogtreecommitdiffstats
path: root/osa/OSA-2019-004.rst
blob: 435ad3969b601c91e0b4055affba310b7911596b (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
.. This work is licensed under a Creative Commons Attribution 4.0 International License.
.. Copyright 2019 Samsung Electronics

:orphan:

===================================================================================
OSA-2019-004: SDNC service allows for arbitrary code execution in sla/dgUpload form
===================================================================================

**Date:** 2019-05-28

**CVE:** CVE-2019-12132

**Severity:** Critical

Affects
-------

* SDNC: before Dublin

Description
-----------

Jakub Botwicz, Wojciech Rauner, Łukasz Wrochna and Radosław Żeszczuk from Samsungreported a vulnerability in SDNC. By executing sla/dgUpload with a crafted filename parameter an unauthenticated attacker can execute arbitrary command. All SDNC setups which includes admportal are affected

Patches
-------

* `85232 <https://gerrit.onap.org/r/#/c/oom/+/85232/>`_

**Warning**

Above patch should be considered only as a temporary walkaround as it only prevents admportal from starting instead of fixing the issues.

Credits
-------

* Jakub Botwicz from Samsung
* Wojciech Rauner from Samsung
* Łukasz Wrochna from Samsung
* Radosław Żeszczuk from Samsung

References
----------

* `OJSI-41 <https://jira.onap.org/browse/OJSI-41>`_
* `CVE-2019-12132 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12132>`_