SAP Knowledge Base Article - Preview

3467006 - Business Intelligence (BOE BI) No Rate Limit Vulnerability

Symptom

  • Vulnerability: Rate limiting is used to control the amount of incoming and outgoing traffic to or from a network.
  • he Rate Limit Filter can help mitigate Denial of Service (DoS) and Brute Force attacks by limiting the number of a requests that are allowed from a single IP address within a time window (also referred to as a time bucket), e.g. 300 Requests per 60 seconds.
  • The reason behind implementing rate limits is to allow for a better flow of data and to increase security by mitigating attacks such as DDoS.
  • Rate limiting also comes in useful if a particular user on the network makes a mistake in their request, thus asking the server to retrieve tons of information that may overload the network for everyone.
  • With rate limiting in place, however, these types of errors or attacks are much more manageable.


Read more...

Environment

  • SAP BusinessObjects Business Intelligence Platform
  • Tomcat

Product

SAP BusinessObjects Business Intelligence platform 4.3

Keywords

rate limit vulnerability, tomcat rate limit, request rate limit BI, rate limit BI Platform, application server rate limit , KBA , BI-BIP-SEC , Security Vulnerabilities in SAP BusinessObjects , BI-BIP-DEP , Webapp Deployment, Networking, Vulnerabilities, Webservices , Problem

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.