Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-24112 PoC — apisix/batch-requests plugin allows overwriting the X-REAL-IP header

Source
Associated Vulnerability
Title:apisix/batch-requests plugin allows overwriting the X-REAL-IP header (CVE-2022-24112)
Description:An attacker can abuse the batch-requests plugin to send requests to bypass the IP restriction of Admin API. A default configuration of Apache APISIX (with default API key) is vulnerable to remote code execution. When the admin key was changed or the port of Admin API was changed to a port different from the data panel, the impact is lower. But there is still a risk to bypass the IP restriction of Apache APISIX's data panel. There is a check in the batch-requests plugin which overrides the client IP with its real remote IP. But due to a bug in the code, this check can be bypassed.
Description
CVE-2022-24112: Apache APISIX Remote Code Execution Vulnerability
Readme
## CVE-2022-24112: Apache APISIX Remote Code Execution Vulnerability

```
go run apisix-exploit.go -t <target> -c <command>
```

Reference:
* https://nvd.nist.gov/vuln/detail/CVE-2022-24112
* https://lists.apache.org/thread/dzmgf0bwfmt58rfbz611gqo2b56qyqwq
File Snapshot

[4.0K] /data/pocs/73cf26a417fcdd9eee112c265f26f73b6fb05e19 ├── [2.6K] apisix-exploit.go └── [ 256] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →