RHSA-2017_1712
Vulnerability from csaf_redhat - Published: 2017-07-06 17:25 - Updated: 2024-11-25 06:47Summary
Red Hat Security Advisory: Red Hat 3scale API Management Platform 2.0.0 security update
Severity
Important
Notes
Topic: A security update for Red Hat 3scale API Management Platform 2.0.0 is now available from the Red Hat Container Catalog.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details: Red Hat 3scale API Management Platform 2.0 is a platform for the management of access and traffic for web-based APIs across a variety of deployment options.
Security Fix(es):
* It was found that RH-3scale AMP would permit creation of an access token without a client secret. An attacker could use this flaw to circumvent authentication controls and gain access to restricted APIs. (CVE-2017-7512)
The underlying container image was also rebuilt to resolve other security issues. These were addressed via the following errata:
* https://access.redhat.com/errata/RHSA-2017:1365
* https://access.redhat.com/errata/RHSA-2017:1481
* https://access.redhat.com/errata/RHSA-2017:1484
Red Hat would like to thank Ryan Nauman (TruCode) for reporting the CVE-2017-7512 issue.
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
It was found that RH-3scale AMP would permit creation of an access token without a client secret. An attacker could use this flaw to circumvent authentication controls and gain access to restricted APIs.
6.5 (Medium)
Vendor Fix
To apply this security fix, use the updated docker images.
https://access.redhat.com/errata/RHSA-2017:1712
References
Acknowledgments
TruCode
Ryan Nauman
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update for Red Hat 3scale API Management Platform 2.0.0 is now available from the Red Hat Container Catalog.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat 3scale API Management Platform 2.0 is a platform for the management of access and traffic for web-based APIs across a variety of deployment options. \n\nSecurity Fix(es):\n\n* It was found that RH-3scale AMP would permit creation of an access token without a client secret. An attacker could use this flaw to circumvent authentication controls and gain access to restricted APIs. (CVE-2017-7512)\n\nThe underlying container image was also rebuilt to resolve other security issues. These were addressed via the following errata:\n* https://access.redhat.com/errata/RHSA-2017:1365\n* https://access.redhat.com/errata/RHSA-2017:1481\n* https://access.redhat.com/errata/RHSA-2017:1484\n\nRed Hat would like to thank Ryan Nauman (TruCode) for reporting the CVE-2017-7512 issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2017:1712",
"url": "https://access.redhat.com/errata/RHSA-2017:1712"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1457997",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1457997"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1712.json"
}
],
"title": "Red Hat Security Advisory: Red Hat 3scale API Management Platform 2.0.0 security update",
"tracking": {
"current_release_date": "2024-11-25T06:47:24+00:00",
"generator": {
"date": "2024-11-25T06:47:24+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2017:1712",
"initial_release_date": "2017-07-06T17:25:45+00:00",
"revision_history": [
{
"date": "2017-07-06T17:25:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2017-07-06T17:25:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-25T06:47:24+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHAMP-2.0",
"product": {
"name": "RHAMP-2.0",
"product_id": "7Server-RH7-3scale-AMP-2.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:3scale_amp:2"
}
}
}
],
"category": "product_family",
"name": "3scale API Management"
},
{
"branches": [
{
"category": "product_version",
"name": "3scale-amp20/memcached@facdf907b2eda22f0f5604c8e068adbbdb6b7e1bdeb2800cf42ce3299d5f6523_amd64",
"product": {
"name": "3scale-amp20/memcached@facdf907b2eda22f0f5604c8e068adbbdb6b7e1bdeb2800cf42ce3299d5f6523_amd64",
"product_id": "3scale-amp20/memcached@facdf907b2eda22f0f5604c8e068adbbdb6b7e1bdeb2800cf42ce3299d5f6523_amd64",
"product_identification_helper": {
"purl": "pkg:oci/memcached@facdf907b2eda22f0f5604c8e068adbbdb6b7e1bdeb2800cf42ce3299d5f6523?arch=amd64\u0026repository_url=registry.redhat.io/3scale-amp20/memcached\u0026tag=1.4.15-8"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "3scale-amp20/memcached@facdf907b2eda22f0f5604c8e068adbbdb6b7e1bdeb2800cf42ce3299d5f6523_amd64 as a component of RHAMP-2.0",
"product_id": "7Server-RH7-3scale-AMP-2.0:3scale-amp20/memcached@facdf907b2eda22f0f5604c8e068adbbdb6b7e1bdeb2800cf42ce3299d5f6523_amd64"
},
"product_reference": "3scale-amp20/memcached@facdf907b2eda22f0f5604c8e068adbbdb6b7e1bdeb2800cf42ce3299d5f6523_amd64",
"relates_to_product_reference": "7Server-RH7-3scale-AMP-2.0"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Ryan Nauman"
],
"organization": "TruCode"
}
],
"cve": "CVE-2017-7512",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2017-05-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1457997"
}
],
"notes": [
{
"category": "description",
"text": "It was found that RH-3scale AMP would permit creation of an access token without a client secret. An attacker could use this flaw to circumvent authentication controls and gain access to restricted APIs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "AMP: validation bypass in oauth",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-3scale-AMP-2.0:3scale-amp20/memcached@facdf907b2eda22f0f5604c8e068adbbdb6b7e1bdeb2800cf42ce3299d5f6523_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-7512"
},
{
"category": "external",
"summary": "RHBZ#1457997",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1457997"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-7512",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7512"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7512",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7512"
}
],
"release_date": "2017-07-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2017-07-06T17:25:45+00:00",
"details": "To apply this security fix, use the updated docker images.",
"product_ids": [
"7Server-RH7-3scale-AMP-2.0:3scale-amp20/memcached@facdf907b2eda22f0f5604c8e068adbbdb6b7e1bdeb2800cf42ce3299d5f6523_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2017:1712"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"7Server-RH7-3scale-AMP-2.0:3scale-amp20/memcached@facdf907b2eda22f0f5604c8e068adbbdb6b7e1bdeb2800cf42ce3299d5f6523_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "AMP: validation bypass in oauth"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…