First published: Fri Feb 12 2021(Updated: )
It was found that 3scale backend does not perform preventive handling on user-requested date ranges in certain queries. A malicious authenticated user could submit a request with a sufficiently large date range eventually yielding an internal server error, resulting in denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat 3scale |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1928302 is classified as a denial of service vulnerability due to potential internal server errors.
To fix REDHAT-BUG-1928302, you should apply the latest security patch provided by Red Hat for 3scale.
Authenticated users of Red Hat 3scale are affected by the vulnerability as they can exploit it with malicious requests.
REHAT-BUG-1928302 is associated with a denial of service attack due to improper handling of user-requested date ranges.
REDHAT-BUG-1928302 requires authenticated user access, meaning it cannot be exploited remotely by unauthenticated attackers.