vendor:
APISIX
by:
Ven3xy
9.8
CVSS
CRITICAL
Remote Code Execution (RCE)
78
CWE
Product Name: APISIX
Affected Version From: 1.3
Affected Version To: 2.12.2001
Patch Exists: YES
Related CWE: CVE-2022-24112
CPE: a:apache:apisix
Tags: cve,cve2022,apache,rce,apisix,oast,kev,intrusive
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei References:
https://www.openwall.com/lists/oss-security/2022/02/11/3, https://twitter.com/sirifu4k1/status/1496043663704858625, https://apisix.apache.org/zh/docs/apisix/plugins/batch-requests, https://nvd.nist.gov/vuln/detail/CVE-2022-24112, http://www.openwall.com/lists/oss-security/2022/02/11/3
Nuclei Metadata: {'max-request': 2, 'fofa-query': 'title="Apache APISIX Dashboard"', 'product': 'apisix', 'shodan-query': 'title:"Apache APISIX Dashboard"', 'vendor': 'apache'}
Platforms Tested: CentOS 7
2022
Apache APISIX 2.12.1 – Remote Code Execution (RCE)
A vulnerability in Apache APISIX versions 1.3 - 2.12.1 allows an attacker to execute arbitrary code on the target system. This is due to the lack of proper input validation when handling user-supplied data. An attacker can exploit this vulnerability by sending a maliciously crafted request to the target system.
Mitigation:
Upgrade to Apache APISIX version 2.12.2 or later.