summaryrefslogtreecommitdiffstats
path: root/osa/OSA-2019-005.rst
blob: 82271b93d365f85e2591af199aad87d6b861da44 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
=====================================================================================
OSA-2019-005: SDNC service allows for arbitrary code execution in sla/printAsXml form
=====================================================================================

**Date:** 2019-05-28

**CVE:** CVE-2019-12123

**Severity:** Critical

Affects
-------

* SDNC: before Dublin

Description
-----------

Jakub Botwicz, Wojciech Rauner, Łukasz Wrochna and Radosław Żeszczuk from Samsung  reported a vulnerability in SDNC. By executing sla/printAsXml with a crafted module parameter an authenticated user can execute arbitrary command. All SDNC setups which includes admportal are affected.

Patches
-------

* `85232 <https://gerrit.onap.org/r/#/c/oom/+/85232/>`_

**Warning**

Above patch should be considered only as a temporary walkaround as it only prevents admportal from starting instead of fixing the issues.

Credits
-------

* Jakub Botwicz from Samsung
* Wojciech Rauner from Samsung
* Łukasz Wrochna from Samsung
* Radosław Żeszczuk from Samsung

References
----------

* `OJSI-42 <https://jira.onap.org/browse/OJSI-42>`_
* `CVE-2019-12123 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12123>`_