{
  "threat_severity" : "Important",
  "public_date" : "2017-07-06T00:00:00Z",
  "bugzilla" : {
    "description" : "AMP: validation bypass in oauth",
    "id" : "1457997",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1457997"
  },
  "cvss3" : {
    "cvss3_base_score" : "6.5",
    "cvss3_scoring_vector" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-863",
  "details" : [ "Red Hat 3scale (aka RH-3scale) API Management Platform (AMP) before 2.0.0 would permit creation of an access token without a client secret. An attacker could use this flaw to circumvent authentication controls and gain access to restricted APIs. NOTE: some sources have a typo in which CVE-2017-7512 maps to an OpenVPN vulnerability. The proper CVE ID for that OpenVPN vulnerability is CVE-2017-7521. Specifically, CVE-2017-7521 is the correct CVE ID for TWO closely related findings in OpenVPN. Any source that lists BOTH CVE-2017-7512 and CVE-2017-7521 for OpenVPN should have listed ONLY CVE-2017-7521.", "It was found that RH-3scale AMP would permit creation of an access token without a client secret. An attacker could use this flaw to circumvent authentication controls and gain access to restricted APIs." ],
  "acknowledgement" : "Red Hat would like to thank Ryan Nauman (TruCode) for reporting this issue.",
  "package_state" : [ {
    "product_name" : "Red Hat 3scale API Management Platform 2",
    "fix_state" : "Affected",
    "package_name" : "backend",
    "cpe" : "cpe:/a:redhat:red_hat_3scale_amp:2"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2017-7512\nhttps://nvd.nist.gov/vuln/detail/CVE-2017-7512" ],
  "name" : "CVE-2017-7512",
  "csaw" : false
}