当前位置:网站首页>Apache APIs IX has the risk of rewriting the x-real-ip header (cve-2022-24112)
Apache APIs IX has the risk of rewriting the x-real-ip header (cve-2022-24112)
2022-07-06 14:18:00 【ApacheAPISIX】
Problem description
stay Apache APISIX 2.12.1 In the previous version ( It doesn't contain 2.12.1 and 2.10.4), Enable Apache APISIX batch-requests After the plug-in , There will be rewriting X-REAL-IP header risk .
This risk leads to two problems :
- Through
batch-requestsPlug ins bypass Apache APISIX Data plane IP Limit . For example, bypass IP Black and white list restrictions . - If the user uses Apache APISIX The default configuration ( Enable Admin API , Use the default Admin Key And no additional management ports are assigned ), Attackers can get through
batch-requestsPlug in call Admin API .
Affects version
- Apache APISIX 1.3 ~ 2.12.1 Between all versions ( It doesn't contain 2.12.1 )
- Apache APISIX 2.10.0 ~ 2.10.4 LTS Between all versions ( It doesn't contain 2.10.4)
Solution
- The problem has been solved in 2.12.1 and 2.10.4 Resolved in version , Please update to the relevant version as soon as possible .
- In the affected Apache APISIX In the version , It can be done to
conf/config.yamlandconf/config-default.yamlFile explicitly commented outbatch-requests, And restart Apache APISIX This risk can be avoided .
Vulnerability Details
Vulnerability priority : high
Vulnerability disclosure time :2022 year 2 month 11 Japan
CVE Details :https://nvd.nist.gov/vuln/detail/CVE-2022-24112
Contributor profile
The vulnerability was discovered by Changting technology in Real World CTF Found in , And by the Sauercloud Report to Apache Software foundation . Thank you for Apache APISIX Community contribution .

边栏推荐
- 强化学习基础记录
- [three paradigms of database] you can understand it at a glance
- C language file operation
- Intensive literature reading series (I): Courier routing and assignment for food delivery service using reinforcement learning
- 7-8 7104 约瑟夫问题(PTA程序设计)
- How to understand the difference between technical thinking and business thinking in Bi?
- Hackmyvm target series (7) -tron
- Package bedding of components
- Nuxtjs quick start (nuxt2)
- Get started with typescript
猜你喜欢

xray與burp聯動 挖掘

xray与burp联动 挖掘

List and data frame of R language experiment III

Record an API interface SQL injection practice

Strengthen basic learning records

Record a penetration of the cat shed from outside to inside. Library operation extraction flag

WEB漏洞-文件操作之文件包含漏洞

Nuxtjs quick start (nuxt2)

Data mining - a discussion on sample imbalance in classification problems

链队实现(C语言)
随机推荐
Load balancing ribbon of microservices
内网渗透之内网信息收集(一)
7-1 输出2到n之间的全部素数(PTA程序设计)
7-8 7104 约瑟夫问题(PTA程序设计)
SQL注入
xray与burp联动 挖掘
7-9 make house number 3.0 (PTA program design)
内网渗透之内网信息收集(二)
Hcip -- MPLS experiment
HackMyvm靶机系列(5)-warez
JDBC事务、批处理以及连接池(超详细)
强化学习基础记录
xray與burp聯動 挖掘
网络基础之路由详解
【头歌educoder数据表中数据的插入、修改和删除】
Simply understand the promise of ES6
Intel oneapi - opening a new era of heterogeneity
Experiment 6 inheritance and polymorphism
Force deduction 152 question multiplier maximum subarray
【educoder数据库实验 索引】