On February 2019, OutSystems became aware of a vulnerability in the ECT Provider platform component. Using the CVSS scoring system, OutSystems has assessed the impact and risk of this vulnerability for cloud and on-premises platform deployments across all supported stacks and classified it accordingly using the CVSS 3.0 scoring system.
The information in this communication will allow you to ascertain the level of exposure to your systems and determine how you should proceed to mitigate the threat.
This vulnerability affects all supported platform stacks.
Base Score: 8.1 (High)
Vector String: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
How to Fix On-Premises Installations
OutSystems issued new versions of the platform that address this vulnerability.
This vulnerability is fixed for version 10.0.1005.2 and all subsequent versions.
For OutSystems PaaS (Cloud) customers we’ve applied the security fix for 10.0.1005.1 and all subsequent versions.
The vulnerability is fixed for version 188.8.131.52 and all subsequent versions.
For OutSystems PaaS (Cloud) customers we've applied the security fix to all O11 versions.
All customers who have yet to update their platform instances are strongly encouraged to do so.
Workaround for On-Premises Customers
A platform upgrade is strongly advised. If you do not have the opportunity to upgrade, we advise you to disable the ECT Provider component for all eSpaces.
OutSystems notified cloud customers and updated or applied a patch to all supported cloud infrastructures.
The environments were patched without the need for a platform server version update.
More About This Vulnerability
Vulnerability reported by Mina Edwar.