From: Krzysztof Opasiak Date: Wed, 5 Jun 2019 21:32:50 +0000 (+0200) Subject: Document OJSI-113 vulnerability X-Git-Tag: 1.6.0~36 X-Git-Url: https://gerrit.onap.org/r/gitweb?a=commitdiff_plain;h=706cd5cf82e16d10d18732fc8df2e3efea7eac87;p=appc.git Document OJSI-113 vulnerability Issue-ID: OJSI-113 Signed-off-by: Krzysztof Opasiak Change-Id: I9d0c35e01dd4f2b42bd115455863ca2d0b8dc3c7 --- diff --git a/docs/release-notes.rst b/docs/release-notes.rst index 5ca3186c0..3a49169c7 100644 --- a/docs/release-notes.rst +++ b/docs/release-notes.rst @@ -120,6 +120,7 @@ The Dublin release added the following functionality: - CVE-2019-12124 `OJSI-63 `_ - APPC exposes Jolokia Interface which allows to read and overwrite any arbitrary file - `OJSI-95 `_ - appc-cdt allows to impersonate any user by setting USER_ID - `OJSI-112 `_ - In default deployment APPC (appc-dgbuilder) exposes HTTP port 30228 outside of cluster. + - `OJSI-113 `_ - In default deployment APPC (appc) exposes HTTP port 30230 outside of cluster. *Known Vulnerabilities in Used Modules*