From: Krzysztof Opasiak Date: Wed, 5 Jun 2019 00:13:05 +0000 (+0200) Subject: Document OJSI-102 vulnerability X-Git-Tag: 1.6.1~324 X-Git-Url: https://gerrit.onap.org/r/gitweb?a=commitdiff_plain;h=bc0129e9d9446a963c330cfd26c1f7be106828c7;p=sdc.git Document OJSI-102 vulnerability Issue-ID: OJSI-102 Signed-off-by: Krzysztof Opasiak Change-Id: Ibfa34510c9522f3d6600a8f65a7239b12ef57f92 --- diff --git a/docs/release-notes.rst b/docs/release-notes.rst index 6dfb77aacb..3af8f5a6ed 100644 --- a/docs/release-notes.rst +++ b/docs/release-notes.rst @@ -110,6 +110,7 @@ Security Notes - [`OJSI-90 `__\ ] - SDC exposes unprotected API for user creation - [`OJSI-94 `__\ ] - sdc-wfd-fe allows to impersonate any user by setting USER_ID - [`OJSI-101 `__\ ] - In default deployment SDC (sdc-be) exposes HTTP port 30205 outside of cluster. +- [`OJSI-102 `__\ ] - In default deployment SDC (sdc-fe) exposes HTTP port 30206 outside of cluster. *Known Vulnerabilities in Used Modules*