OSA-2019-004: SDNC service allows for arbitrary code execution in sla/dgUpload form
SDNC: before Dublin
Jakub Botwicz, Wojciech Rauner, Łukasz Wrochna and Radosław Żeszczuk from Samsungreported a vulnerability in SDNC. By executing sla/dgUpload with a crafted filename parameter an unauthenticated attacker can execute arbitrary command. All SDNC setups which includes admportal are affected
Above patch should be considered only as a temporary walkaround as it only prevents admportal from starting instead of fixing the issues.
Jakub Botwicz from Samsung
Wojciech Rauner from Samsung
Łukasz Wrochna from Samsung
Radosław Żeszczuk from Samsung