3scale Red Hat 3scale

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Red Hat 3scale.

Recent Red Hat 3scale Security Advisories

Advisory Title Published
RHSA-2021:5191 (RHSA-2021:5191) Moderate: Red Hat 3scale API Management 2.11.1 Release - Container Images December 16, 2021
RHSA-2021:3851 (RHSA-2021:3851) Important: Red Hat 3scale API Management 2.11.0 Release - Container Images October 14, 2021

By the Year

In 2026 there have been 0 vulnerabilities in Red Hat 3scale. 3scale did not have any published security vulnerabilities last year.




Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 1 6.30
2023 0 0.00
2022 2 7.30
2021 3 6.35
2020 1 5.90
2019 1 0.00

It may take a day or so for new 3scale vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Red Hat 3scale Security Vulnerabilities

3Scale OIDC Token Introspection Bypass in RH-SSO 7.5
CVE-2024-0560 6.3 - Medium - February 28, 2024

A vulnerability was found in 3Scale, when used with Keycloak 15 (or RHSSO 7.5.0) and superiors. When the auth_type is use_3scale_oidc_issuer_endpoint, the Token Introspection policy discovers the Token Introspection endpoint from the token_introspection_endpoint field, but the field was removed on RH-SSO 7.5. As a result, the policy doesn't inspect tokens, it determines that all tokens are valid.

Improper Handling of Insufficient Permissions or Privileges

It was found that 3scale's APIdocs does not validate the access token, in the case of invalid token, it uses session auth instead
CVE-2021-3814 7.5 - High - March 25, 2022

It was found that 3scale's APIdocs does not validate the access token, in the case of invalid token, it uses session auth instead. This conceivably bypasses access controls and permits unauthorized information disclosure.

AuthZ

A use-after-free flaw was found in the Linux kernels Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition
CVE-2021-3752 7.1 - High - February 16, 2022

A use-after-free flaw was found in the Linux kernels Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

Race Condition

It was found that all versions of 3Scale developer portal lacked brute force protections
CVE-2021-3412 7.3 - High - June 01, 2021

It was found that all versions of 3Scale developer portal lacked brute force protections. An attacker could use this gap to bypass login controls, and access privileged information, or possibly conduct further attacks.

Improper Restriction of Excessive Authentication Attempts

A flaw was found in Red Hat 3scales API docs URL, where it is accessible without credentials
CVE-2020-25634 5.4 - Medium - May 26, 2021

A flaw was found in Red Hat 3scales API docs URL, where it is accessible without credentials. This flaw allows an attacker to view sensitive information or modify service APIs. Versions before 3scale-2.10.0-ER1 are affected.

Missing Authentication for Critical Function

A vulnerability was found that the 3scale dev portal does not employ mechanisms for protection against login CSRF
CVE-2019-14836 - May 26, 2021

A vulnerability was found that the 3scale dev portal does not employ mechanisms for protection against login CSRF. An attacker could use this flaw to access unauthorized information or conduct further attacks.

A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem in versions before 5.7
CVE-2020-10711 5.9 - Medium - May 22, 2020

A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.

NULL Pointer Dereference

A vulnerability was found in 3scale before version 2.6, did not set the HTTPOnly attribute on the user session cookie
CVE-2019-14849 - December 12, 2019

A vulnerability was found in 3scale before version 2.6, did not set the HTTPOnly attribute on the user session cookie. An attacker could use this to conduct cross site scripting attacks and gain access to unauthorized information.

Insertion of Sensitive Information Into Sent Data

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Red Hat 3scale or by Red Hat? Click the Watch button to subscribe.

Red Hat
Vendor

subscribe