Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache APISIX | Apache APISIX 2.12 ~ 2.12.1 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2022-24112:Apache APISIX apisix/batch-requests RCE | https://github.com/Mr-xn/CVE-2022-24112 | POC Details |
| 2 | Apache APISIX apisix/batch-requests RCE | https://github.com/Udyz/CVE-2022-24112 | POC Details |
| 3 | Apache APISIX batch-requests RCE(CVE-2022-24112) | https://github.com/Axx8/CVE-2022-24112 | POC Details |
| 4 | CVE-2022-24112: Apache APISIX Remote Code Execution Vulnerability | https://github.com/Mah1ndra/CVE-2022-24112 | POC Details |
| 5 | Apache APISIX Remote Code Execution (CVE-2022-24112) proof of concept exploit | https://github.com/M4xSec/Apache-APISIX-CVE-2022-24112 | POC Details |
| 6 | Apache APISIX 2.12.1 Remote Code Execution by IP restriction bypass and using default admin AIP token | https://github.com/kavishkagihan/CVE-2022-24112-POC | POC Details |
| 7 | Apache APISIX < 2.12.1 Remote Code Execution and Docker Lab | https://github.com/twseptian/cve-2022-24112 | POC Details |
| 8 | CVE-2022-24112_POC | https://github.com/Acczdy/CVE-2022-24112_POC | POC Details |
| 9 | None | https://github.com/wshepherd0010/CVE-2022-24112-Lab | POC Details |
| 10 | New exploit for Apache APISIX 2.12.1 - Remote Code Execution (RCE) | https://github.com/btar1gan/exploit_CVE-2022-24112 | POC Details |
| 11 | Apache APISIX apisix/batch-requests RCE | https://github.com/CrackerCat/CVE-2022-24112 | POC Details |
| 12 | A default configuration of Apache APISIX (with default API key) is vulnerable to remote code execution. An attacker can abuse the batch-requests plugin to send requests to bypass the IP restriction of Admin API. When the admin key was changed or the port of Admin API was changed to a port different from the data panel, the impact is lower. But there is still a risk to bypass the IP restriction of Apache APISIX's data panel. There is a check in the batch-requests plugin which overrides the client IP with its real remote IP. But due to a bug in the code, this check can be bypassed. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-24112.yaml | POC Details |
| 13 | Apache APISIX batch-requests RCE(CVE-2022-24112) | https://github.com/SecNN/CVE-2022-24112 | POC Details |
| 14 | None | https://github.com/fatkz/CVE-2022-24112 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2022-24289 | Deserialization of untrusted data in the Hessian Component of Apache Cayenne 4.1 with olde | |
| CVE-2021-44521 | Remote code execution for scripted UDFs |
No comments yet