.. This work is licensed under a Creative Commons Attribution 4.0 International License. .. Copyright 2019 Samsung Electronics :orphan: ===================================================================================== OSA-2019-005: SDNC service allows for arbitrary code execution in sla/printAsXml form ===================================================================================== **Date:** 2019-05-28 **CVE:** CVE-2019-12123 **Severity:** Critical Affects ------- * SDNC: before Dublin Description ----------- Jakub Botwicz, Wojciech Rauner, Łukasz Wrochna and Radosław Żeszczuk from Samsung reported a vulnerability in SDNC. By executing sla/printAsXml with a crafted module parameter an authenticated user can execute arbitrary command. All SDNC setups which includes admportal are affected. Patches ------- * `85232 `_ **Warning** Above patch should be considered only as a temporary walkaround as it only prevents admportal from starting instead of fixing the issues. Credits ------- * Jakub Botwicz from Samsung * Wojciech Rauner from Samsung * Łukasz Wrochna from Samsung * Radosław Żeszczuk from Samsung References ---------- * `OJSI-42 `_ * `CVE-2019-12123 `_