OSA-2019-019: SDNC service allows for arbitrary code execution in sla/upload form
SDNC: before Dublin
Jakub Botwicz, Wojciech Rauner, Łukasz Wrochna and Radosław Żeszczuk from Samsung reported a vulnerability in SDNC. By executing sla/upload with a crafted filename parameter an unauthenticated attacker can execute arbitrary command. All SDC setups which includes admportal are affected.
Above patch should be considered only as a temporary walkaround as it only prevents admportal from starting instead of fixing the issues.
Jakub Botwicz from Samsung
Wojciech Rauner from Samsung
Łukasz Wrochna from Samsung
Radosław Żeszczuk from Samsung