CVE-2021-43557
HIGHApache APISIX < 2.10.2 - URI Blocklist Bypass via Unnormalized Request URI
Title source: llmExploitation Summary
EIP tracks 1 public exploit for CVE-2021-43557. PoCs published by xvnpw.
AI-analyzed exploit summary This PoC demonstrates a path traversal vulnerability in Apache APISIX (CVE-2021-43557) by bypassing URI-blocker restrictions using encoded and unencoded path traversal sequences. It includes a Kubernetes setup with public and protected services to showcase the exploit.
Description
The uri-block plugin in Apache APISIX before 2.10.2 uses $request_uri without verification. The $request_uri is the full original request URI without normalization. This makes it possible to construct a URI to bypass the block list on some occasions. For instance, when the block list contains "^/internal/", a URI like `//internal/` can be used to bypass it. Some other plugins also have the same issue. And it may affect the developer's custom plugin.
Exploits (1)
This PoC demonstrates a path traversal vulnerability in Apache APISIX (CVE-2021-43557) by bypassing URI-blocker restrictions using encoded and unencoded path traversal sequences. It includes a Kubernetes setup with public and protected services to showcase the exploit.
References (4)
Scores
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N