Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-24112 PoC — apisix/batch-requests plugin allows overwriting the X-REAL-IP header

Source
Associated Vulnerability
Title:apisix/batch-requests plugin allows overwriting the X-REAL-IP header (CVE-2022-24112)
Description:An attacker can abuse the batch-requests plugin to send requests to bypass the IP restriction of Admin API. A default configuration of Apache APISIX (with default API key) is vulnerable to remote code execution. When the admin key was changed or the port of Admin API was changed to a port different from the data panel, the impact is lower. But there is still a risk to bypass the IP restriction of Apache APISIX's data panel. There is a check in the batch-requests plugin which overrides the client IP with its real remote IP. But due to a bug in the code, this check can be bypassed.
Description
Apache APISIX batch-requests RCE(CVE-2022-24112)
Readme
# CVE-2022-24112
Apache APISIX batch-requests RCE(CVE-2022-24112)

```
将目标放入url.txt
python3 Apache_APISIX_RCE(CVE-2022-24112).py

Cmd: <command>
```

![image](https://github.com/Axx8/CVE-2022-24112/blob/main/CVE-2022-24112.png)
File Snapshot

[4.0K] /data/pocs/5f040bbff901aa53e368f71846e9ccc6554a8357 ├── [2.0K] Apache_APISIX_RCE(CVE-2022-24112).py ├── [ 70K] CVE-2022-24112.png ├── [ 238] README.md └── [ 1] url.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →