当前位置:网站首页>Apache APIs IX has the risk of rewriting the x-real-ip header (cve-2022-24112)
Apache APIs IX has the risk of rewriting the x-real-ip header (cve-2022-24112)
2022-07-06 14:18:00 【ApacheAPISIX】
Problem description
stay Apache APISIX 2.12.1 In the previous version ( It doesn't contain 2.12.1 and 2.10.4), Enable Apache APISIX batch-requests After the plug-in , There will be rewriting X-REAL-IP header risk .
This risk leads to two problems :
- Through
batch-requestsPlug ins bypass Apache APISIX Data plane IP Limit . For example, bypass IP Black and white list restrictions . - If the user uses Apache APISIX The default configuration ( Enable Admin API , Use the default Admin Key And no additional management ports are assigned ), Attackers can get through
batch-requestsPlug in call Admin API .
Affects version
- Apache APISIX 1.3 ~ 2.12.1 Between all versions ( It doesn't contain 2.12.1 )
- Apache APISIX 2.10.0 ~ 2.10.4 LTS Between all versions ( It doesn't contain 2.10.4)
Solution
- The problem has been solved in 2.12.1 and 2.10.4 Resolved in version , Please update to the relevant version as soon as possible .
- In the affected Apache APISIX In the version , It can be done to
conf/config.yamlandconf/config-default.yamlFile explicitly commented outbatch-requests, And restart Apache APISIX This risk can be avoided .
Vulnerability Details
Vulnerability priority : high
Vulnerability disclosure time :2022 year 2 month 11 Japan
CVE Details :https://nvd.nist.gov/vuln/detail/CVE-2022-24112
Contributor profile
The vulnerability was discovered by Changting technology in Real World CTF Found in , And by the Sauercloud Report to Apache Software foundation . Thank you for Apache APISIX Community contribution .

边栏推荐
- 1143_ SiCp learning notes_ Tree recursion
- Simply understand the promise of ES6
- Poker game program - man machine confrontation
- Intensive literature reading series (I): Courier routing and assignment for food delivery service using reinforcement learning
- 内网渗透之内网信息收集(二)
- A complete collection of papers on text recognition
- . How to upload XMIND files to Jinshan document sharing online editing?
- 实验八 异常处理
- HackMyvm靶机系列(5)-warez
- Strengthen basic learning records
猜你喜欢
随机推荐
The difference between layer 3 switch and router
内网渗透之内网信息收集(二)
Intel oneapi - opening a new era of heterogeneity
JDBC transactions, batch processing, and connection pooling (super detailed)
Poker game program - man machine confrontation
Hackmyvm Target Series (3) - vues
Canvas foundation 1 - draw a straight line (easy to understand)
Hackmyvm target series (6) -videoclub
7-1 output all primes between 2 and n (PTA programming)
浅谈漏洞发现思路
On the idea of vulnerability discovery
Meituan dynamic thread pool practice ideas, open source
Nuxtjs quick start (nuxt2)
HackMyvm靶机系列(5)-warez
Experiment 7 use of common classes (correction post)
7-4 hash table search (PTA program design)
Hackmyvm target series (1) -webmaster
WEB漏洞-文件操作之文件包含漏洞
小程序web抓包-fiddler
Package bedding of components








