Document OJSI-126 vulnerability 16/89316/1
authorKrzysztof Opasiak <k.opasiak@samsung.com>
Wed, 5 Jun 2019 00:13:33 +0000 (02:13 +0200)
committerKrzysztof Opasiak <k.opasiak@samsung.com>
Wed, 5 Jun 2019 00:13:33 +0000 (02:13 +0200)
Issue-ID: OJSI-126
Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com>
Change-Id: I8cab133e7a39342c7d72cec6bc522aa6f5cca797

docs/release-notes.rst

index 3af8f5a..3ce998f 100644 (file)
@@ -111,6 +111,7 @@ Security Notes
 -  [`OJSI-94 <https://jira.onap.org/browse/OJSI-94>`__\ ] - sdc-wfd-fe allows to impersonate any user by setting USER_ID
 -  [`OJSI-101 <https://jira.onap.org/browse/OJSI-101>`__\ ] - In default deployment SDC (sdc-be) exposes HTTP port 30205 outside of cluster.
 -  [`OJSI-102 <https://jira.onap.org/browse/OJSI-102>`__\ ] - In default deployment SDC (sdc-fe) exposes HTTP port 30206 outside of cluster.
+-  [`OJSI-126 <https://jira.onap.org/browse/OJSI-126>`__\ ] - In default deployment SDC (sdc-wfd-fe) exposes HTTP port 30256 outside of cluster.
 
 *Known Vulnerabilities in Used Modules*