First published: Fri Feb 12 2021(Updated: )
A flaw was found in Red Hat 3scale API Management Platform 2. The 3scale backend does not perform preventive handling on user-requested date ranges in certain queries allowing a malicious authenticated user to submit a request with a sufficiently large date range to eventually yield an internal server error resulting in denial of service. The highest threat from this vulnerability is to system availability.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat 3scale Api Management | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this flaw in Red Hat 3scale API Management Platform 2 is CVE-2021-20252.
CVE-2021-20252 has a severity rating of 6.5 (Medium).
The affected software for CVE-2021-20252 is Red Hat 3scale API Management Platform version 2.0.
The vulnerability in Red Hat 3scale API Management Platform 2 occurs due to a lack of preventive handling on user-requested date ranges in certain queries.
Yes, CVE-2021-20252 can be exploited by a malicious authenticated user.