.. / CVE-2020-13945

Exploit for Apache APISIX - Insufficiently Protected Credentials (CVE-2020-13945)

Description:

Apache APISIX 1.2, 1.3, 1.4, and 1.5 is susceptible to insufficiently protected credentials. An attacker can enable the Admin API and delete the Admin API access IP restriction rules. Eventually, the default token is allowed to access APISIX management data.

Nuclei Template

View the template here CVE-2020-13945.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2020/CVE-2020-13945.yaml
Copy

References:

https://github.com/ARPSyndicate/cvemon
https://nvd.nist.gov/vuln/detail/CVE-2020-13945
https://lists.apache.org/thread.html/r792feb29964067a4108f53e8579a1e9bd1c8b5b9bc95618c814faf2f%40%3Cdev.apisix.apache.org%3E
http://packetstormsecurity.com/files/166228/Apache-APISIX-Remote-Code-Execution.html
https://github.com/vulhub/vulhub/tree/master/apisix/CVE-2020-13945