Informazioni sul CVE-2022-24112
apisix/batch-requests plugin allows overwriting the X-REAL-IP header
CWE ID: CWE-290
Base Score (CVSS): N/A
CVE: CVE-2022-24112
Descrizione: An attacker can abuse the batch-requests plugin to send requests to bypass the IP restriction of Admin API. A default configuration of Apache APISIX (with default API key) is vulnerable to remote code execution. When the admin key was changed or the port of Admin API was changed to a port different from the data panel, the impact is lower. But there is still a risk to bypass the IP restriction of Apache APISIX’s data panel. There is a check in the batch-requests plugin which overrides the client IP with its real remote IP. But due to a bug in the code, this check can be bypassed.
Vettore di attacco
Punteggio CVSS
Il CVSS è un sistema di valutazione che misura la gravità di una vulnerabilità informatica considerando fattori come l’impatto potenziale, la probabilità di attacco e la facilità di esecuzione.
Riassunto: .
Dettaglio del Vettore
Metrica | Valore | Significato | Descrizione |
---|
Riferimenti esterni
- https://lists.apache.org/thread/lcdqywz8zy94mdysk7p3gfdgn51jmt94
- http://www.openwall.com/lists/oss-security/2022/02/11/3
- http://packetstormsecurity.com/files/166228/Apache-APISIX-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/166328/Apache-APISIX-2.12.1-Remote-Code-Execution.html
Prodotti interessati
- Apache Software Foundation – Apache APISIX
Relazioni con altri prodotti
Produttore:Apache Software Foundation
Prodotto: Apache APISIX
Anno: 2022
CWE: CWE-290
CVSS: 0.0