Cpe Name:
cpe:2.3:a:redhat:3scale:*:*:*:*:*:*:*:*
# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1 |
CVE-2021-3814 |
862 |
|
Bypass |
2022-03-25 |
2022-04-07 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
It was found that 3scale's APIdocs does not validate the access token, in the case of invalid token, it uses session auth instead. This conceivably bypasses access controls and permits unauthorized information disclosure. |
2 |
CVE-2021-3412 |
307 |
|
Bypass |
2021-06-01 |
2021-07-08 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
It was found that all versions of 3Scale developer portal lacked brute force protections. An attacker could use this gap to bypass login controls, and access privileged information, or possibly conduct further attacks. |
3 |
CVE-2020-25634 |
284 |
|
|
2021-05-26 |
2021-06-03 |
5.5 |
None |
Remote |
Low |
??? |
Partial |
Partial |
None |
A flaw was found in Red Hat 3scale’s API docs URL, where it is accessible without credentials. This flaw allows an attacker to view sensitive information or modify service APIs. Versions before 3scale-2.10.0-ER1 are affected. |
4 |
CVE-2019-14849 |
79 |
|
XSS |
2019-12-12 |
2019-12-17 |
3.5 |
None |
Remote |
Medium |
??? |
None |
Partial |
None |
A vulnerability was found in 3scale before version 2.6, did not set the HTTPOnly attribute on the user session cookie. An attacker could use this to conduct cross site scripting attacks and gain access to unauthorized information. |
Total number of vulnerabilities :
4
Page :
1
(This Page)