Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-24112— apisix/batch-requests plugin allows overwriting the X-REAL-IP header

KEV EPSS 94.44% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-24112

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
apisix/batch-requests plugin allows overwriting the X-REAL-IP header
Source: NVD (National Vulnerability Database)
Vulnerability Description
An attacker can abuse the batch-requests plugin to send requests to bypass the IP restriction of Admin API. A default configuration of Apache APISIX (with default API key) is vulnerable to remote code execution. When the admin key was changed or the port of Admin API was changed to a port different from the data panel, the impact is lower. But there is still a risk to bypass the IP restriction of Apache APISIX's data panel. There is a check in the batch-requests plugin which overrides the client IP with its real remote IP. But due to a bug in the code, this check can be bypassed.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
使用欺骗进行的认证绕过
Source: NVD (National Vulnerability Database)
Vulnerability Title
Apache APISIX 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Apache Apisix是美国阿帕奇(Apache)基金会的一个云原生的微服务API网关服务。该软件基于 OpenResty 和 etcd 来实现,具备动态路由和插件热加载,适合微服务体系下的 API 管理。 Apache APISIX 中存在安全漏洞,该漏洞源于产品的batch-requests插件未对用户的批处理请求进行有效限制。攻击者可通过该漏洞绕过Admin Api的限制。 以下产品及版本受到影响:Apache APISIX 2.10.4 之前版本、Apache APISIX 2.12.1 之前
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Apache Software FoundationApache APISIX Apache APISIX 2.12 ~ 2.12.1 -

II. Public POCs for CVE-2022-24112

#POC DescriptionSource LinkShenlong Link
1CVE-2022-24112:Apache APISIX apisix/batch-requests RCEhttps://github.com/Mr-xn/CVE-2022-24112POC Details
2Apache APISIX apisix/batch-requests RCEhttps://github.com/Udyz/CVE-2022-24112POC Details
3Apache APISIX batch-requests RCE(CVE-2022-24112)https://github.com/Axx8/CVE-2022-24112POC Details
4CVE-2022-24112: Apache APISIX Remote Code Execution Vulnerabilityhttps://github.com/Mah1ndra/CVE-2022-24112POC Details
5Apache APISIX Remote Code Execution (CVE-2022-24112) proof of concept exploit https://github.com/M4xSec/Apache-APISIX-CVE-2022-24112POC Details
6Apache APISIX 2.12.1 Remote Code Execution by IP restriction bypass and using default admin AIP tokenhttps://github.com/kavishkagihan/CVE-2022-24112-POCPOC Details
7Apache APISIX < 2.12.1 Remote Code Execution and Docker Labhttps://github.com/twseptian/cve-2022-24112POC Details
8CVE-2022-24112_POChttps://github.com/Acczdy/CVE-2022-24112_POCPOC Details
9Nonehttps://github.com/wshepherd0010/CVE-2022-24112-LabPOC Details
10New exploit for Apache APISIX 2.12.1 - Remote Code Execution (RCE)https://github.com/btar1gan/exploit_CVE-2022-24112POC Details
11Apache APISIX apisix/batch-requests RCEhttps://github.com/CrackerCat/CVE-2022-24112POC Details
12A default configuration of Apache APISIX (with default API key) is vulnerable to remote code execution. An attacker can abuse the batch-requests plugin to send requests to bypass the IP restriction of Admin API. When the admin key was changed or the port of Admin API was changed to a port different from the data panel, the impact is lower. But there is still a risk to bypass the IP restriction of Apache APISIX's data panel. There is a check in the batch-requests plugin which overrides the client IP with its real remote IP. But due to a bug in the code, this check can be bypassed.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-24112.yamlPOC Details
13Apache APISIX batch-requests RCE(CVE-2022-24112)https://github.com/SecNN/CVE-2022-24112POC Details
14Nonehttps://github.com/fatkz/CVE-2022-24112POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-24112

登录查看更多情报信息。

Same Patch Batch · Apache Software Foundation · 2022-02-11 · 3 CVEs total

CVE-2022-24289Deserialization of untrusted data in the Hessian Component of Apache Cayenne 4.1 with olde
CVE-2021-44521Remote code execution for scripted UDFs

IV. Related Vulnerabilities

V. Comments for CVE-2022-24112

No comments yet


Leave a comment