Goby/json/Apache-APISIX-Admin-API-Def...

69 lines
5.0 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Name": "Apache APISIX Admin API Default Access Token (CVE-2020-13945)",
"Description": "<p>Apache Apisix is a cloud-native microservice API gateway service of the Apache Foundation.</p><p>There is a default key vulnerability in Apache Apisix. The user enables the management API and deletes the IP restriction rule for accessing the management API, which allows attackers to access APISIX management data and upload malicious scripts to execute arbitrary commands and take over server permissions.</p>",
"Product": "Apache APISIX",
"Homepage": "http://apisix.apache.org/",
"DisclosureDate": "2022-01-04",
"Author": "1291904552@qq.com",
"FofaQuery": "title=\"Apache APISIX Dashboard\"",
"GobyQuery": "title=\"Apache APISIX Dashboard\"",
"Level": "2",
"Impact": "<p>There is a default key vulnerability in Apache Apisix. The user enables the management API and deletes the IP restriction rule for accessing the management API, which allows attackers to access APISIX management data and upload malicious scripts to execute arbitrary commands and take over server permissions.</p>",
"Recommendation": "<p>The vendor has released a bug fix, please pay attention to the update in time: <a href=\"https://lists.apache.org/thread.html/r792feb29964067a4108f53e8579a1e9bd1c8b5b9bc95618c814faf2f%40%3Cdev.apisix.apache.org%3E\">https://lists.apache.org/thread.html/r792feb29964067a4108f53e8579a1e9bd1c8b5b9bc95618c814faf2f%40%3Cdev.apisix.apache.org%3E</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2. If not necessary, prohibit public network access to the system.</p>",
"Translation": {
"CN": {
"Name": "Apache APISIX 默认秘钥导致远程命令执行漏洞 (CVE-2020-13945)",
"VulType": ["命令执行"],
"Tags": ["命令执行"],
"Description": "<p>Apache Apisix是Apache基金会的一个云原生的微服务API网关服务。</p><p>Apache Apisix存在默认密钥漏洞用户启用了管理API并删除了管理API访问IP限制规则导致允许攻击者访问APISIX管理数据并上传恶意脚本执行任意命令接管服务器权限。</p>",
"Impact": "<p>Apache Apisix存在默认密钥漏洞用户启用了管理API并删除了管理API访问IP限制规则导致允许攻击者访问APISIX管理数据并上传恶意脚本执行任意命令接管服务器权限。</p>",
"Product": "Apache APISIX",
"Recommendation": "<p>⼚商已发布了漏洞修复程序,请及时关注更新:<a href=\"https://lists.apache.org/thread.html/r792feb29964067a4108f53e8579a1e9bd1c8b5b9bc95618c814faf2f%40%3Cdev.apisix.apache.org%3E\">https://lists.apache.org/thread.html/r792feb29964067a4108f53e8579a1e9bd1c8b5b9bc95618c814faf2f%40%3Cdev.apisix.apache.org%3E</a></p><p>1、通过防⽕墙等安全设备设置访问策略设置⽩名单访问。</p><p>2、如⾮必要禁⽌公⽹访问该系统。</p>"
},
"EN": {
"Name": "Apache APISIX Admin API Default Access Token (CVE-2020-13945)",
"VulType": ["rce"],
"Tags": ["rce"],
"Description": "<p>Apache Apisix is a cloud-native microservice API gateway service of the Apache Foundation.</p><p>There is a default key vulnerability in Apache Apisix. The user enables the management API and deletes the IP restriction rule for accessing the management API, which allows attackers to access APISIX management data and upload malicious scripts to execute arbitrary commands and take over server permissions.</p>",
"Impact": "<p>There is a default key vulnerability in Apache Apisix. The user enables the management API and deletes the IP restriction rule for accessing the management API, which allows attackers to access APISIX management data and upload malicious scripts to execute arbitrary commands and take over server permissions.</p>",
"Product": "Apache APISIX",
"Recommendation": "<p>The vendor has released a bug fix, please pay attention to the update in time: <a href=\"https://lists.apache.org/thread.html/r792feb29964067a4108f53e8579a1e9bd1c8b5b9bc95618c814faf2f%40%3Cdev.apisix.apache.org%3E\">https://lists.apache.org/thread.html/r792feb29964067a4108f53e8579a1e9bd1c8b5b9bc95618c814faf2f%40%3Cdev.apisix.apache.org%3E</a></p><p>1. Set access policies and whitelist access through security devices such as firewalls.</p><p>2.If not necessary, prohibit public network access to the system.</p>"
}
},
"References": [
"https://github.com/projectdiscovery/nuclei-templates/blob/master/cves/2020/CVE-2020-13945.yaml"
],
"HasExp": true,
"ExpParams": [
{
"name": "cmd",
"type": "input",
"value": "id"
}
],
"ExpTips": null,
"ScanSteps": null,
"Tags": [
"rce"
],
"VulType": [
"rce"
],
"CVEIDs": [
"CVE-2020-13945"
],
"CVSSScore": "9.0",
"AttackSurfaces": {
"Application": null,
"Support": null,
"Service": null,
"System": null,
"Hardware": null
},
"CNNVD": [
"CNNVD-202012-424"
],
"CNVD": [
"CNVD-2021-06957"
]
}