Red Hat 3scale

CPE Details

Red Hat 3scale
-
2019-12-18
11h24 +00:00
2019-12-18
11h24 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:redhat:3scale:-:*:*:*:*:*:*:*

Informations

Vendor

redhat

Product

3scale

Version

-

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2024-0560 2024-02-28 16h37 +00:00 A vulnerability was found in 3Scale, when used with Keycloak 15 (or RHSSO 7.5.0) and superiors. When the auth_type is use_3scale_oidc_issuer_endpoint, the Token Introspection policy discovers the Token Introspection endpoint from the token_introspection_endpoint field, but the field was removed on RH-SSO 7.5. As a result, the policy doesn't inspect tokens, it determines that all tokens are valid.
6.3
Moyen
CVE-2021-3814 2022-03-25 17h02 +00:00 It was found that 3scale's APIdocs does not validate the access token, in the case of invalid token, it uses session auth instead. This conceivably bypasses access controls and permits unauthorized information disclosure.
7.5
Haute
CVE-2021-3412 2021-06-01 11h47 +00:00 It was found that all versions of 3Scale developer portal lacked brute force protections. An attacker could use this gap to bypass login controls, and access privileged information, or possibly conduct further attacks.
7.3
Haute
CVE-2020-25634 2021-05-26 18h54 +00:00 A flaw was found in Red Hat 3scale’s API docs URL, where it is accessible without credentials. This flaw allows an attacker to view sensitive information or modify service APIs. Versions before 3scale-2.10.0-ER1 are affected.
5.4
Moyen
CVE-2019-14849 2019-12-12 12h14 +00:00 A vulnerability was found in 3scale before version 2.6, did not set the HTTPOnly attribute on the user session cookie. An attacker could use this to conduct cross site scripting attacks and gain access to unauthorized information.
5.4
Moyen