diff options
author | Krzysztof Opasiak <k.opasiak@samsung.com> | 2019-10-23 18:14:25 +0200 |
---|---|---|
committer | Krzysztof Opasiak <k.opasiak@samsung.com> | 2019-10-23 21:21:02 +0200 |
commit | 6e81e33474e089e5845da8755e17c29a29197f28 (patch) | |
tree | 72c1fb9952785470c2fc1ca6e1f78d941cfebba4 | |
parent | 245d6f05d6e74ea3ea5c2bc4a6fa73cc64dba4c5 (diff) |
Improve security release notes for El Alto
Make sure that all issues are documented with enough details.
Issue-ID: OJSI-41
Issue-ID: OJSI-42
Issue-ID: OJSI-199
Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com>
Change-Id: I70a1fcf9962f59b6d4d69644ebd36676b63e66a9
Former-commit-id: 7462a4c32166d74cd4565774b82d7221c49b4f30
-rw-r--r-- | docs/release-notes.rst | 14 |
1 files changed, 13 insertions, 1 deletions
diff --git a/docs/release-notes.rst b/docs/release-notes.rst index 9bf9cae5..9e8f1017 100644 --- a/docs/release-notes.rst +++ b/docs/release-notes.rst @@ -70,20 +70,32 @@ Dublin. These issues have been resolved in El Alto. *Fixed Security Issues* - CVE-2019-12132 `OJSI-41 <https://jira.onap.org/browse/OJSI-41>`_ SDNC service allows for arbitrary code execution in sla/dgUpload form + Fixed temporarily by disabling admportal. - CVE-2019-12123 `OJSI-42 <https://jira.onap.org/browse/OJSI-42>`_ SDNC service allows for arbitrary code execution in sla/printAsXml form + Fixed temporarily by disabling admportal. - CVE-2019-12113 `OJSI-43 <https://jira.onap.org/browse/OJSI-43>`_ SDNC service allows for arbitrary code execution in sla/printAsGv form + Fixed by removing this API endpoint. - `OJSI-91 <https://jira.onap.org/browse/OJSI-91>`_ SDNC exposes unprotected API for user creation + Fixed temporarily by disabling admportal. - `OJSI-98 <https://jira.onap.org/browse/OJSI-98>`_ In default deployment SDNC (sdnc-portal) exposes HTTP port 30201 outside of cluster. + Port 30201 now uses HTTPS protocol. - CVE-2019-12112 `OJSI-199 <https://jira.onap.org/browse/OJSI-199>`_ SDNC service allows for arbitrary code execution in sla/upload form + Fixed temporarily by disabling admportal. - `OJSI-34 <https://jira.onap.org/browse/OJSI-34>`_ Multiple SQL Injection issues in SDNC - `OJSI-99 <https://jira.onap.org/browse/OJSI-99>`_ In default deployment SDNC (sdnc) exposes HTTP port 30202 outside of cluster. + Port 30202 is no longer used. - `OJSI-100 <https://jira.onap.org/browse/OJSI-100>`_ In default deployment SDNC (sdnc-dgbuilder) exposes HTTP port 30203 outside of cluster. + Port 30203 now uses HTTPS protocol. - `OJSI-179 <https://jira.onap.org/browse/OJSI-179>`_ dev-sdnc-sdnc exposes JDWP on port 1830 which allows for arbitrary code execution + Ticket has been closed as no one was able to reproduce the issue. - `OJSI-183 <https://jira.onap.org/browse/OJSI-183>`_ SDNC exposes ssh service on port 30208 + Port 30202 is no longer used. *Known Security Issues* - +For CVE-2019-12132, CVE-2019-12123 and CVE-2019-12112 only temporary fix has been applied. +This fix simply prevents admportal from being started and exposed. +If admportal is to be used in your deployment, please be very cautious and remember to fix those vulnerabilities on your own. *Known Vulnerabilities in Used Modules* |