First published: Wed Mar 18 2020(Updated: )
An issue was discovered in ONAP SDNC before Dublin. By executing sla/upload with a crafted filename parameter, an unauthenticated attacker can execute an arbitrary command. All SDC setups that include admportal are affected.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Onap Open Network Automation Platform | >=3.0.0<4.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12112 is classified as a high severity vulnerability due to its potential for remote command execution.
To mitigate CVE-2019-12112, upgrade to a patched version of ONAP SDNC that addresses this security issue.
All SDC setups that include admportal and are running ONAP SDNC prior to the Dublin release are affected by CVE-2019-12112.
An unauthenticated attacker can exploit CVE-2019-12112 to execute arbitrary commands on the server.
CVE-2019-12112 leverages a crafted filename parameter during the sla/upload process to trigger command execution.