.. / CVE-2022-24112

Exploit for Apache APISIX - Remote Code Execution (CVE-2022-24112)

Description:

A default configuration of Apache APISIX (with default API key) is vulnerable to remote code execution. An attacker can abuse the batch-requests plugin to send requests to bypass the IP restriction of Admin API. When the admin key was changed or the port of Admin API was changed to a port different from the data panel, the impact is lower. But there is still a risk to bypass the IP restriction of Apache APISIX’s data panel. There is a check in the batch-requests plugin which overrides the client IP with its real remote IP. But due to a bug in the code, this check can be bypassed.

Nuclei Template

View the template here CVE-2022-24112.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2022/CVE-2022-24112.yaml
Copy

References:

https://twitter.com/sirifu4k1/status/1496043663704858625
https://apisix.apache.org/zh/docs/apisix/plugins/batch-requests
https://www.openwall.com/lists/oss-security/2022/02/11/3
http://www.openwall.com/lists/oss-security/2022/02/11/3
https://nvd.nist.gov/vuln/detail/CVE-2022-24112