当前位置:网站首页>Apache APIs IX has the risk of rewriting the x-real-ip header (cve-2022-24112)
Apache APIs IX has the risk of rewriting the x-real-ip header (cve-2022-24112)
2022-07-06 14:18:00 【ApacheAPISIX】
Problem description
stay Apache APISIX 2.12.1 In the previous version ( It doesn't contain 2.12.1 and 2.10.4), Enable Apache APISIX batch-requests After the plug-in , There will be rewriting X-REAL-IP header risk .
This risk leads to two problems :
- Through
batch-requestsPlug ins bypass Apache APISIX Data plane IP Limit . For example, bypass IP Black and white list restrictions . - If the user uses Apache APISIX The default configuration ( Enable Admin API , Use the default Admin Key And no additional management ports are assigned ), Attackers can get through
batch-requestsPlug in call Admin API .
Affects version
- Apache APISIX 1.3 ~ 2.12.1 Between all versions ( It doesn't contain 2.12.1 )
- Apache APISIX 2.10.0 ~ 2.10.4 LTS Between all versions ( It doesn't contain 2.10.4)
Solution
- The problem has been solved in 2.12.1 and 2.10.4 Resolved in version , Please update to the relevant version as soon as possible .
- In the affected Apache APISIX In the version , It can be done to
conf/config.yamlandconf/config-default.yamlFile explicitly commented outbatch-requests, And restart Apache APISIX This risk can be avoided .
Vulnerability Details
Vulnerability priority : high
Vulnerability disclosure time :2022 year 2 month 11 Japan
CVE Details :https://nvd.nist.gov/vuln/detail/CVE-2022-24112
Contributor profile
The vulnerability was discovered by Changting technology in Real World CTF Found in , And by the Sauercloud Report to Apache Software foundation . Thank you for Apache APISIX Community contribution .

边栏推荐
- HackMyvm靶机系列(5)-warez
- Data mining - a discussion on sample imbalance in classification problems
- A complete collection of papers on text recognition
- 循环队列(C语言)
- xray與burp聯動 挖掘
- Hackmyvm target series (4) -vulny
- Record once, modify password logic vulnerability actual combat
- XSS之冷门事件
- 网络层—简单的arp断网
- Meituan dynamic thread pool practice ideas, open source
猜你喜欢

sqqyw(淡然点图标系统)漏洞复现和74cms漏洞复现

强化学习基础记录

Canvas foundation 1 - draw a straight line (easy to understand)

附加简化版示例数据库到SqlServer数据库实例中

记一次edu,SQL注入实战

内网渗透之内网信息收集(五)

Yugu p1012 spelling +p1019 word Solitaire (string)

内网渗透之内网信息收集(四)

Intranet information collection of Intranet penetration (I)

Hackmyvm target series (4) -vulny
随机推荐
中间件漏洞复现—apache
Canvas foundation 2 - arc - draw arc
实验七 常用类的使用
7-8 7104 Joseph problem (PTA program design)
Experiment 9 input and output stream (excerpt)
Meituan dynamic thread pool practice ideas, open source
Which is more advantageous in short-term or long-term spot gold investment?
7-14 error ticket (PTA program design)
C language file operation
7-5 走楼梯升级版(PTA程序设计)
UGUI—Text
Hackmyvm target series (6) -videoclub
[experiment index of educator database]
HackMyvm靶机系列(7)-Tron
Web vulnerability - File Inclusion Vulnerability of file operation
Feature extraction and detection 14 plane object recognition
Record an API interface SQL injection practice
记一次,修改密码逻辑漏洞实战
[three paradigms of database] you can understand it at a glance
JDBC事务、批处理以及连接池(超详细)