Skip to main content

 

 

 

 
Language:
 
 
 
OutSystems

Vulnerability RPD-5160

Template:OutSystems/Documentation_KB/ContentCollaboration
  • Edit
    Collaborate with us
    Edit this page on GitHub
  • Critical Security bulletin ID RPD-5160
    First published July 27, 2020
    Public disclosure October 27, 2020
    Status Public disclosure
    Workarounds No
    OutSystems bug IDs RPD-5160; RPM-329
    CVSS Score 9.6

    Vulnerability summary

    OutSystems became aware of a vulnerability that, if exploited, may allow an attacker to compromise the availability, and integrity of the data handled and stored by the Platform Server.

    OutSystems doesn't have any indication or reason to believe that this vulnerability has been exploited in the wild.

    Affected products

    Only products listed at Vulnerable products and versions are known to be affected by this vulnerability. All other products aren’t affected by the aforementioned vulnerability.

    Vulnerable products and versions

    This vulnerability affects all versions of the Platform Server and LifeTime.

    Vulnerability details

    One of the OutSystems services contained a path traversal vulnerability that would allow a developer to write arbitrary files to a location where the files could be executed. Since services run with high privileges, this could potentially lead to fully compromising the host and gaining access to any file or key present on the filesystem.

    Workarounds

    There's no workaround, we strongly advise to update to the fixed versions.

    Fixed products and versions

    • For OutSystems Cloud infrastructures, OutSystems notified all its cloud customers and applied a no-downtime hotfix targeted at the specific version of each customer. The hotfix didn't require an update of the Platform Server version.

    • For self-managed, you should upgrade to one of the following releases (or subsequent release);

      • Platform Server: 10.0.1102.0 and 11.9.0
      • LifeTime: 11.7.0

    Exploitation and public announcements

    The OutSystems Product Security Incident Response Team (PSIRT) has been able to reproduce the vulnerability proving it can be exploited.

    FAQs

    Question Answer
    By exploiting this vulnerability can an attacker access my data? Yes. By exploiting this vulnerability, an attacker may have, in time, full access to all data stored by the OutSystems Platform.
    Has this vulnerability been exploited in the wild? OutSystems doesn't have any evidence that this vulnerability has been exploited in the wild or that any customer was affected.
    What do I need to do? Update your OutSystems Platform Server to the above-mentioned version that applies. For cloud environments, OutSystems will patch the environments for you.
    Who can I talk to about this? If you have any questions, contact your Customer Success Manager. If you don’t have one, contact us via our support channels.
    • Was this article helpful?