QID 730361

Date Published: 2022-02-28

QID 730361: Apache Apisix Batch-Requests Plugin Remote Code Execution (RCE) Vulnerability

Apache APISIX is a dynamic, real-time, high-performance API gateway. APISIX provides rich traffic management features such as load balancing, dynamic upstream, canary release, circuit breaking, authentication, observability, and more.

An attacker can abuse the batch-requests plugin to send requests to bypass the IP restriction of Admin API. A default configuration of Apache APISIX (with default API key) is vulnerable to remote code execution. When the admin key was changed or the port of Admin API was changed to a port different from the data panel, the impact is lower. But there is still a risk to bypass the IP restriction of Apache APISIX's data panel.

Affected Versions:
Apache APISIX Prior to 2.12.1

QID Detection Logic(unauthenticated): This QID checks for vulnerable Apache Apisix versions by sending a payload to the Apisix Server

Successful exploitation of the vulnerability may allow remote code execution and complete system compromise

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Vendor has release patch, for more information please refer to Apache AdvisoryWorkaround:
    explicitly configure the enabled plugins in `conf/config.yaml`,ensure `batch-requests` is disabled.
    Vendor References

    CVEs related to QID 730361

    Software Advisories
    Advisory ID Software Component Link
    NA URL Logo apisix.apache.org/downloads/