CVE-2022-24112

CRITICAL KEV NUCLEI LAB

APISIX Admin API default access token RCE

Title source: metasploit

Description

An attacker can abuse the batch-requests plugin to send requests to bypass the IP restriction of Admin API. A default configuration of Apache APISIX (with default API key) is vulnerable to remote code execution. When the admin key was changed or the port of Admin API was changed to a port different from the data panel, the impact is lower. But there is still a risk to bypass the IP restriction of Apache APISIX's data panel. There is a check in the batch-requests plugin which overrides the client IP with its real remote IP. But due to a bug in the code, this check can be bypassed.

Exploits (12)

exploitdb WORKING POC
by Ven3xy · pythonremotemultiple
https://www.exploit-db.com/exploits/50829
nomisec WRITEUP 44 stars
by Mr-xn · remote
https://github.com/Mr-xn/CVE-2022-24112
nomisec WORKING POC 13 stars
by M4xSec · poc
https://github.com/M4xSec/Apache-APISIX-CVE-2022-24112
nomisec WORKING POC 9 stars
by twseptian · remote
https://github.com/twseptian/cve-2022-24112
nomisec WORKING POC 8 stars
by SecNN · poc
https://github.com/SecNN/CVE-2022-24112
nomisec WORKING POC 7 stars
by Mah1ndra · poc
https://github.com/Mah1ndra/CVE-2022-24112
nomisec WORKING POC 5 stars
by Acczdy · remote
https://github.com/Acczdy/CVE-2022-24112_POC
nomisec WORKING POC 2 stars
by kavishkagihan · poc
https://github.com/kavishkagihan/CVE-2022-24112-POC
nomisec WORKING POC 1 stars
by btar1gan · poc
https://github.com/btar1gan/exploit_CVE-2022-24112
nomisec WORKING POC
by fatkz · remote
https://github.com/fatkz/CVE-2022-24112
nomisec WORKING POC
by CrackerCat · poc
https://github.com/CrackerCat/CVE-2022-24112
vulncheck_xdb WORKING POC
remote
https://github.com/Mah1ndra/CVE-2022-244112

Nuclei Templates (1)

Apache APISIX - Remote Code Execution
CRITICALby Mr-xn
Shodan: title:"Apache APISIX Dashboard" || http.title:"apache apisix dashboard"
FOFA: title="Apache APISIX Dashboard" || title="apache apisix dashboard"

Scores

CVSS v3 9.8
EPSS 0.9444
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Lab Environment

COMMUNITY
Community Lab
docker pull openresty/openresty:1.19.3.1-alpine-fat
docker pull api7/apisix-base:1.19.9.1.3
docker pull openresty/openresty:1.19.3.2-alpine-fat
docker pull bitnami/etcd:3.4.9
docker pull apache/apisix-dashboard:2.10.1-alpine
+4 more images
+8 more repos

Details

CISA KEV 2022-08-25
VulnCheck KEV 2022-08-19
InTheWild.io 2022-08-25
ENISA EUVD EUVD-2022-29024
CWE
CWE-290
Status published
Products (1)
apache/apisix < 2.10.4
Published Feb 11, 2022
KEV Added Aug 25, 2022
Tracked Since Feb 18, 2026