CVE-2022-24112 Scanner
Detects 'Remote Code Execution (RCE)' vulnerability in Apache APISIX affects v. from 2.12 before 2.12.1, 2.10 before 2.10.4, 1.x before 1.3.
Short Info
Level
Critical
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
1 month 3 days
Scan only one
Domain, IPv4, Subdomain
Toolbox
-
Apache APISIX is an open-source API gateway that provides users with features such as load balancing, traffic control, and API management. It is designed to handle high volumes of traffic and provide a highly available infrastructure for microservices. The product is used by developers to manage their APIs, as well as by security teams to secure their API endpoints. Apache APISIX uses plugins to extend its functionality and provide users with additional features.
The CVE-2022-24112 vulnerability detected in Apache APISIX is a critical security issue that can allow an attacker to bypass the IP restriction of the platform's Admin API. This vulnerability exists due to a bug in the batch-requests plugin, which can be exploited by an attacker to send requests that bypass the IP restriction of the Admin API. When exploited, this vulnerability allows an attacker to gain unauthorized access to the API gateway and potentially execute remote code.
If this vulnerability is exploited, it can lead to a range of severe consequences like data breach, system hijacking, and unauthorized access to critical resources. If an attacker gains unauthorized access to the API gateway, they can execute arbitrary code on the system, access confidential data, and disrupt the infrastructure's availability.
With the pro features of the s4e.io platform, users can quickly and easily learn about vulnerabilities in their digital assets. The platform provides users with real-time vulnerability detection and automated scanning, helping teams stay ahead of security threats. With its user-friendly interface and comprehensive reporting, s4e.io is the perfect solution for businesses looking to keep their assets safe and secure.
REFERENCES