**Date:** 2019-05-28 **ID:** OSA-2019-004
**Title:** SDNC service allows for arbitrary code execution in sla/dgUpload form **CVE:** CVE-2019-12132 **Severity:** Critical Affects ------- * SDNC: before Dublin Description ----------- Jakub Botwicz, Wojciech Rauner, Łukasz Wrochna and Radosław Żeszczuk from Samsungreported a vulnerability in SDNC. By executing sla/dgUpload with a crafted filename parameter an unauthenticated attacker can execute arbitrary command. All SDNC setups which includes admportal are affected Patches ------- * `85232 <https://gerrit.onap.org/r/#/c/oom/+/85232/>`_ **Warning** Above patch should be considered only as a temporary walkaround as it only prevents admportal from starting instead of fixing the issues. Credits ------- * Jakub Botwicz from Samsung * Wojciech Rauner from Samsung * Łukasz Wrochna from Samsung * Radosław Żeszczuk from Samsung References ---------- * `OJSI-41 <https://jira.onap.org/browse/OJSI-41>`_ * `CVE-2019-12132 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12132>`_ -- Krzysztof Opasiak Samsung R&D Institute Poland Samsung Electronics -=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#5026): https://lists.onap.org/g/onap-tsc/message/5026 Mute This Topic: https://lists.onap.org/mt/31822311/21656 Group Owner: [email protected] Unsubscribe: https://lists.onap.org/g/onap-tsc/leave/2743226/1412191262/xyzzy [[email protected]] -=-=-=-=-=-=-=-=-=-=-=-
