![]() ![]() All ONAP Operations Manager (OOM) setups are affected.Īn issue was discovered in ONAP SDC through Dublin. In ONAP OOM through Dublin, by accessing an applicable port (30234, 30290, 32010, 30270, 30224, 30281, 30254, 30285, and/or 30271), an attacker gains full access to the respective ONAP services without any authentication. All SDC setups that include admportal are affected. By executing sla/upload with a crafted filename parameter, an unauthenticated attacker can execute an arbitrary command. All ONAP Operations Manager (OOM) setups are affected.Īn issue was discovered in ONAP SDNC before Dublin. By accessing port 7001 of demo-sdc-sdc-wfd-be pod, an unauthenticated attacker (who already has access to pod-to-pod communication) may execute arbitrary code inside that pod. By accessing port 4000 of demo-sdc-sdc-be pod, an unauthenticated attacker (who already has access to pod-to-pod communication) may execute arbitrary code inside that pod. LisoMail, by ArmorX, allows SQL Injections, attackers can access the database without authentication via a URL parameter manipulation.Īn issue was discovered in ONAP SDC through Dublin. So if a YAML file was loaded from an untrusted source, it could therefore load and execute code out of the control of the host application. Apache Commons Configuration versions 2.2, 2.3, 2.4, 2.5, 2.6 did not change the default settings of this library. ![]() ![]() Anttix_linux_and_mx_linux - anttix_linux_and_mx_linuxĪntiX and MX Linux allow local users to achieve root access via "persist-config -command /bin/sh" because of the Sudo configuration.Īpache Commons Configuration uses a third-party library to parse YAML files which by default allows the instantiation of classes if the YAML includes special statements. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |