QID 730361
Date Published: 2022-02-28
QID 730361: Apache Apisix Batch-Requests Plugin Remote Code Execution (RCE) Vulnerability
Apache APISIX is a dynamic, real-time, high-performance API gateway. APISIX provides rich traffic management features such as load balancing, dynamic upstream, canary release, circuit breaking, authentication, observability, and more.
An attacker can abuse the batch-requests plugin to send requests to bypass the IP restriction of Admin API. A default configuration of Apache APISIX (with default API key) is vulnerable to remote code execution. When the admin key was changed or the port of Admin API was changed to a port different from the data panel, the impact is lower. But there is still a risk to bypass the IP restriction of Apache APISIX's data panel.
Affected Versions:
Apache APISIX Prior to 2.12.1
QID Detection Logic(unauthenticated): This QID checks for vulnerable Apache Apisix versions by sending a payload to the Apisix Server
Successful exploitation of the vulnerability may allow remote code execution and complete system compromise
explicitly configure the enabled plugins in `conf/config.yaml`,ensure `batch-requests` is disabled.
- Apache Apisix batch requests -
lists.apache.org/thread/lcdqywz8zy94mdysk7p3gfdgn51jmt94
CVEs related to QID 730361
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| NA |
|