|
Message-ID: <CAADJU122drfk2TE_bLJ=HoWJG_T6Rxnq0ngX+GQqOGXFmEoKNA@mail.gmail.com> Date: Fri, 11 Feb 2022 16:51:21 +0800 From: Zexuan Luo <spacewander@...che.org> To: announce@...che.org, dev@...six.apache.org, Apache Security Team <security@...che.org>, oss-security@...ts.openwall.com, Live Overflow <liveoverflow@...il.com> Subject: CVE-2022-24112: Apache APISIX: apisix/batch-requests plugin allows overwriting the X-REAL-IP header Severity: high Description: An attacker can abuse the batch-requests plugin to send requests to bypass the IP restriction of Admin API. A default configuration of Apache APISIX (with default API key) is vulnerable to remote code execution. When the admin key was changed or the port of Admin API was changed to a port different from the data panel, the impact is lower. But there is still a risk to bypass the IP restriction of Apache APISIX's data panel. There is a check in the batch-requests plugin which overrides the client IP with its real remote IP. But due to a bug in the code, this check can be bypassed. Mitigation: 1. explicitly configure the enabled plugins in `conf/config.yaml`, ensure `batch-requests` is disabled. (Or just comment out `batch-requests` in `conf/config-default.yaml`) Or 1. upgrade to 2.10.4 or 2.12.1. Credit: Original discovery by Real World CTF at Chaitin Tech. Reported by Sauercloud.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.