CVE-2019-12124
📋 TL;DR
This vulnerability in ONAP APPC exposes an unprotected Jolokia interface, allowing unauthenticated attackers to read or overwrite arbitrary files. All APPC setups before the Dublin release are affected, potentially compromising sensitive data and system integrity.
💻 Affected Systems
- ONAP APPC
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through arbitrary file overwrite leading to remote code execution, data theft, or service disruption.
Likely Case
Unauthenticated attackers reading sensitive configuration files, credentials, or overwriting critical files to disrupt services.
If Mitigated
Limited impact if interface is properly secured or network access is restricted.
🎯 Exploit Status
Exploitation involves accessing exposed Jolokia interface which is straightforward for attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Dublin release or later
Vendor Advisory: https://jira.onap.org/browse/OJSI-63
Restart Required: Yes
Instructions:
1. Upgrade ONAP APPC to Dublin release or later. 2. Verify Jolokia interface is properly secured. 3. Restart APPC services.
🔧 Temporary Workarounds
Restrict Jolokia Interface Access
linuxConfigure firewall rules to restrict access to Jolokia interface ports
iptables -A INPUT -p tcp --dport 8778 -j DROP
ufw deny 8778/tcp
Disable Jolokia Interface
allDisable the exposed Jolokia interface in APPC configuration
Edit APPC configuration to set jolokia.enabled=false
🧯 If You Can't Patch
- Implement strict network segmentation to isolate APPC systems
- Deploy web application firewall with rules to block Jolokia interface access
🔍 How to Verify
Check if Vulnerable:
Check if Jolokia interface is accessible on default port 8778 without authentication: curl http://<appc_host>:8778/jolokia
Check Version:
Check ONAP version documentation or APPC component version
Verify Fix Applied:
Verify Jolokia interface requires authentication or is inaccessible: curl http://<appc_host>:8778/jolokia should return 401/403 or connection refused
📡 Detection & Monitoring
Log Indicators:
- Unauthenticated access to /jolokia endpoints
- File read/write operations from unexpected sources
Network Indicators:
- Unusual traffic to port 8778 from external sources
- Multiple file access attempts via Jolokia
SIEM Query:
source_port=8778 AND (http_uri CONTAINS '/jolokia' OR http_user_agent CONTAINS 'Jolokia')