First published: Thu Jun 01 2017(Updated: )
It was found that RH-3scale would permit creation of an access token without a client secret. An attacker could use this flaw to circumvent authentication controls and gain access to restricted APIs.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat 3scale |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.