OSA-2019-005: SDNC service allows for arbitrary code execution in sla/printAsXml form
SDNC: before Dublin
Jakub Botwicz, Wojciech Rauner, Łukasz Wrochna and Radosław Żeszczuk from Samsung reported a vulnerability in SDNC. By executing sla/printAsXml with a crafted module parameter an authenticated user can execute arbitrary command. All SDNC setups which includes admportal are affected.
Above patch should be considered only as a temporary walkaround as it only prevents admportal from starting instead of fixing the issues.
Jakub Botwicz from Samsung
Wojciech Rauner from Samsung
Łukasz Wrochna from Samsung
Radosław Żeszczuk from Samsung