**Date:** 2019-05-28

**ID:** OSA-2019-004

**Title:** SDNC service allows for arbitrary code execution in 
sla/dgUpload form

**CVE:** CVE-2019-12132

**Severity:** Critical

Affects
-------

* SDNC: before Dublin

Description
-----------

Jakub Botwicz, Wojciech Rauner, Łukasz Wrochna and Radosław Żeszczuk 
from Samsungreported a vulnerability in SDNC. By executing sla/dgUpload 
with a crafted filename parameter an unauthenticated attacker can 
execute arbitrary command. All SDNC setups which includes admportal are 
affected

Patches
-------

* `85232 <https://gerrit.onap.org/r/#/c/oom/+/85232/>`_

**Warning**

Above patch should be considered only as a temporary walkaround as it 
only prevents admportal from starting instead of fixing the issues.

Credits
-------

* Jakub Botwicz from Samsung
* Wojciech Rauner from Samsung
* Łukasz Wrochna from Samsung
* Radosław Żeszczuk from Samsung

References
----------

* `OJSI-41 <https://jira.onap.org/browse/OJSI-41>`_
* `CVE-2019-12132 
<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12132>`_

-- 
Krzysztof Opasiak
Samsung R&D Institute Poland
Samsung Electronics

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.

View/Reply Online (#5026): https://lists.onap.org/g/onap-tsc/message/5026
Mute This Topic: https://lists.onap.org/mt/31822311/21656
Group Owner: [email protected]
Unsubscribe: https://lists.onap.org/g/onap-tsc/leave/2743226/1412191262/xyzzy  
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to