Document OJSI-112 vulnerability 34/89434/1
authorKrzysztof Opasiak <k.opasiak@samsung.com>
Wed, 5 Jun 2019 21:32:21 +0000 (23:32 +0200)
committerKrzysztof Opasiak <k.opasiak@samsung.com>
Wed, 5 Jun 2019 21:32:21 +0000 (23:32 +0200)
Issue-ID: OJSI-112
Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com>
Change-Id: Id28f332ddcdd5c69f5a82758d05c10d19606faff

docs/release-notes.rst

index 4123ff9..5ca3186 100644 (file)
@@ -119,6 +119,7 @@ The Dublin release added the following functionality:
       - `OJSI-29 <https://jira.onap.org/browse/OJSI-29>`_ - Unsecured Swagger UI Interface in AAPC
       - CVE-2019-12124 `OJSI-63 <https://jira.onap.org/browse/OJSI-63>`_ - APPC exposes Jolokia Interface which allows to read and overwrite any arbitrary file
       - `OJSI-95 <https://jira.onap.org/browse/OJSI-95>`_ - appc-cdt allows to impersonate any user by setting USER_ID
+      - `OJSI-112 <https://jira.onap.org/browse/OJSI-112>`_ - In default deployment APPC (appc-dgbuilder) exposes HTTP port 30228 outside of cluster.
 
 *Known Vulnerabilities in Used Modules*