In versions prior to Apache APISIX 2.12.1, there is a risk of rewriting X-REAL-IP header after enabling the Apache APISIX
batch-requests
plug-in. Now the processing information will be announced.
#
Problem DescriptionIn versions of Apache APISIX prior to 2.12.1 (excluding 2.12.1 and 2.10.4), there is a risk of rewriting the X-REAL-IP header when the Apache APISIX batch-requests plugin is enabled.
This risk leads to two problems:
- An attacker bypasses the IP restrictions on the Apache APISIX data plane via the batch-requests plugin. For example, bypassing IP black and white list restrictions.
- If the user uses the default Apache APISIX configuration (Admin API enabled, with the default Admin Key and no additional admin port assigned), an attacker can invoke the Admin API via the batch-requests plug-in.
#
Affected Versions- All versions of Apache APISIX between 1.3 ~ 2.12.1 (excluding 2.12.1)
- All LTS versions of Apache APISIX between 2.10.0 ~ 2.10.4 (excluding 2.10.4)
#
Solution- This issue has been resolved in versions 2.12.1 and 2.10.4, please update to the relevant version as soon as possible.
- In affected versions of Apache APISIX, you can avoid this risk by explicitly commenting out batch-requests in the conf/config.yaml and conf/config-default.yaml files and restarting Apache APISIX.
#
Vulnerability detailsSeverity:High
Vulnerability public date: February 11, 2022
CVE details: https://nvd.nist.gov/vuln/detail/CVE-2022-24112
#
Contributor ProfileThis vulnerability was reported to the Apache Software Foundation by Sauercloud. Thank you for your contributions to the Apache APISIX community.