Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-24112 PoC — apisix/batch-requests plugin allows overwriting the X-REAL-IP header

Source
Associated Vulnerability
Title:apisix/batch-requests plugin allows overwriting the X-REAL-IP header (CVE-2022-24112)
Description:An attacker can abuse the batch-requests plugin to send requests to bypass the IP restriction of Admin API. A default configuration of Apache APISIX (with default API key) is vulnerable to remote code execution. When the admin key was changed or the port of Admin API was changed to a port different from the data panel, the impact is lower. But there is still a risk to bypass the IP restriction of Apache APISIX's data panel. There is a check in the batch-requests plugin which overrides the client IP with its real remote IP. But due to a bug in the code, this check can be bypassed.
Description
New exploit for Apache APISIX 2.12.1 - Remote Code Execution (RCE)
Readme
# exploit_CVE-2022-24112

CVE-2022-24112

### Installation

```bash
git clone https://github.com/btar1gan/exploit_CVE-2022-24112
```
    
### Usage

```bash
cd exploit_CVE-2022-24112/
python3 50829_1.py && python3 50829_2.py
```




If you have any feedback, please reach out

File Snapshot

[4.0K] /data/pocs/ce0fad5fb1f042d3a41f590282561fb2bd8cc4b9 ├── [1.7K] 50829_1.py ├── [ 736] 50829_2.py └── [ 277] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →