Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2022-24112

An attacker can abuse the batch-requests plugin to send requests to bypass the IP restriction of Admin API. A default configuration of Apache APISIX (with default API key) is vulnerable to remote code execution. When the admin key was changed or the port of Admin API was changed to a port different from the data panel, the impact is lower. But there is still a risk to bypass the IP restriction of Apache APISIX's data panel. There is a check in the batch-requests plugin which overrides the client IP with its real remote IP. But due to a bug in the code, this check can be bypassed.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.943
EPSS Ranking 99.9%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.5
Proposed Action
Apache APISIX contains an authentication bypass vulnerability that allows for remote code execution.
Ransomware Campaign
Unknown
Products affected by CVE-2022-24112
  • Apache » Apisix » Version: N/A
    cpe:2.3:a:apache:apisix:-
  • Apache » Apisix » Version: 0.2
    cpe:2.3:a:apache:apisix:0.2
  • Apache » Apisix » Version: 0.3
    cpe:2.3:a:apache:apisix:0.3
  • Apache » Apisix » Version: 0.3-1
    cpe:2.3:a:apache:apisix:0.3-1
  • Apache » Apisix » Version: 0.4.1
    cpe:2.3:a:apache:apisix:0.4.1
  • Apache » Apisix » Version: 0.5
    cpe:2.3:a:apache:apisix:0.5
  • Apache » Apisix » Version: 0.6rc0
    cpe:2.3:a:apache:apisix:0.6rc0
  • Apache » Apisix » Version: 0.7
    cpe:2.3:a:apache:apisix:0.7
  • Apache » Apisix » Version: 0.8
    cpe:2.3:a:apache:apisix:0.8
  • Apache » Apisix » Version: 0.9-
    cpe:2.3:a:apache:apisix:0.9-
  • Apache » Apisix » Version: 0.9rc1
    cpe:2.3:a:apache:apisix:0.9rc1
  • Apache » Apisix » Version: 1.0
    cpe:2.3:a:apache:apisix:1.0
  • Apache » Apisix » Version: 1.1
    cpe:2.3:a:apache:apisix:1.1
  • Apache » Apisix » Version: 1.2
    cpe:2.3:a:apache:apisix:1.2
  • Apache » Apisix » Version: 1.3
    cpe:2.3:a:apache:apisix:1.3
  • Apache » Apisix » Version: 1.4
    cpe:2.3:a:apache:apisix:1.4
  • Apache » Apisix » Version: 1.4.1
    cpe:2.3:a:apache:apisix:1.4.1
  • Apache » Apisix » Version: 1.5
    cpe:2.3:a:apache:apisix:1.5
  • Apache » Apisix » Version: 2.0
    cpe:2.3:a:apache:apisix:2.0
  • Apache » Apisix » Version: 2.1
    cpe:2.3:a:apache:apisix:2.1
  • Apache » Apisix » Version: 2.10.0
    cpe:2.3:a:apache:apisix:2.10.0
  • Apache » Apisix » Version: 2.10.1
    cpe:2.3:a:apache:apisix:2.10.1
  • Apache » Apisix » Version: 2.10.2
    cpe:2.3:a:apache:apisix:2.10.2
  • Apache » Apisix » Version: 2.10.3
    cpe:2.3:a:apache:apisix:2.10.3
  • Apache » Apisix » Version: 2.11.0
    cpe:2.3:a:apache:apisix:2.11.0
  • Apache » Apisix » Version: 2.12.0
    cpe:2.3:a:apache:apisix:2.12.0
  • Apache » Apisix » Version: 2.2
    cpe:2.3:a:apache:apisix:2.2
  • Apache » Apisix » Version: 2.3
    cpe:2.3:a:apache:apisix:2.3
  • Apache » Apisix » Version: 2.4
    cpe:2.3:a:apache:apisix:2.4
  • Apache » Apisix » Version: 2.5
    cpe:2.3:a:apache:apisix:2.5
  • Apache » Apisix » Version: 2.6
    cpe:2.3:a:apache:apisix:2.6
  • Apache » Apisix » Version: 2.7
    cpe:2.3:a:apache:apisix:2.7
  • Apache » Apisix » Version: 2.8
    cpe:2.3:a:apache:apisix:2.8
  • Apache » Apisix » Version: 2.9
    cpe:2.3:a:apache:apisix:2.9


Contact Us

Shodan ® - All rights reserved