当前位置:网站首页>Apache APIs IX has the risk of rewriting the x-real-ip header (cve-2022-24112)
Apache APIs IX has the risk of rewriting the x-real-ip header (cve-2022-24112)
2022-07-06 14:18:00 【ApacheAPISIX】
Problem description
stay Apache APISIX 2.12.1 In the previous version ( It doesn't contain 2.12.1 and 2.10.4), Enable Apache APISIX batch-requests After the plug-in , There will be rewriting X-REAL-IP header risk .
This risk leads to two problems :
- Through
batch-requestsPlug ins bypass Apache APISIX Data plane IP Limit . For example, bypass IP Black and white list restrictions . - If the user uses Apache APISIX The default configuration ( Enable Admin API , Use the default Admin Key And no additional management ports are assigned ), Attackers can get through
batch-requestsPlug in call Admin API .
Affects version
- Apache APISIX 1.3 ~ 2.12.1 Between all versions ( It doesn't contain 2.12.1 )
- Apache APISIX 2.10.0 ~ 2.10.4 LTS Between all versions ( It doesn't contain 2.10.4)
Solution
- The problem has been solved in 2.12.1 and 2.10.4 Resolved in version , Please update to the relevant version as soon as possible .
- In the affected Apache APISIX In the version , It can be done to
conf/config.yamlandconf/config-default.yamlFile explicitly commented outbatch-requests, And restart Apache APISIX This risk can be avoided .
Vulnerability Details
Vulnerability priority : high
Vulnerability disclosure time :2022 year 2 month 11 Japan
CVE Details :https://nvd.nist.gov/vuln/detail/CVE-2022-24112
Contributor profile
The vulnerability was discovered by Changting technology in Real World CTF Found in , And by the Sauercloud Report to Apache Software foundation . Thank you for Apache APISIX Community contribution .

边栏推荐
猜你喜欢

Strengthen basic learning records

网络基础详解

网络层—简单的arp断网

Windows platform mongodb database installation

Network technology related topics

攻防世界MISC练习区(gif 掀桌子 ext3 )

Hackmyvm target series (6) -videoclub

Hackmyvm target series (5) -warez

《英特尔 oneAPI—打开异构新纪元》

JDBC transactions, batch processing, and connection pooling (super detailed)
随机推荐
实验六 继承和多态
Record once, modify password logic vulnerability actual combat
7-5 staircase upgrade (PTA program design)
7-15 h0161. Find the greatest common divisor and the least common multiple (PTA program design)
SRC mining ideas and methods
Hackmyvm target series (7) -tron
2022华中杯数学建模思路
HackMyvm靶机系列(2)-warrior
Hackmyvm target series (5) -warez
How to turn wechat applet into uniapp
外网打点(信息收集)
Sqqyw (indifferent dot icon system) vulnerability recurrence and 74cms vulnerability recurrence
[insert, modify and delete data in the headsong educator data table]
实验七 常用类的使用(修正帖)
Hackmyvm Target Series (3) - vues
Hackmyvm target series (2) -warrior
Mathematical modeling idea of 2022 central China Cup
攻防世界MISC练习区(gif 掀桌子 ext3 )
AQS details
Hackmyvm target series (6) -videoclub