Apache APISIX < 2.10.4 / 2.11.x < 2.12.1 RCE

critical Nessus Plugin ID 160203

Synopsis

An application installed on the remote host is missing a vendor-supplied update.

Description

The version of Apache APISIX installed on the remote host is prior to 2.10.4 or 2.11.x prior to 2.12.1. It is, therefore, affected by a remote code execution vulnerability due to flaw in the product's source code. An unauthenticated, remote attacker can exploit this to bypass authentication and execute arbitrary code.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Apache APISIX version 2.10.4, 12.12.1 or later.

See Also

http://www.nessus.org/u?6f54c8b3

http://www.nessus.org/u?a86b6df0

http://www.nessus.org/u?6a465d29

http://www.nessus.org/u?f04566dc

http://www.nessus.org/u?04f44e92

Plugin Details

Severity: Critical

ID: 160203

File Name: apache_apisix_2_12_1.nasl

Version: 1.5

Type: remote

Family: Misc.

Published: 4/26/2022

Updated: 2/13/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2022-24112

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:apisix

Required KB Items: installed_sw/Apache APISIX

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/10/2020

Vulnerability Publication Date: 2/11/2020

CISA Known Exploited Vulnerability Due Dates: 9/15/2022

Exploitable With

Core Impact

Metasploit (APISIX Admin API default access token RCE)

Reference Information

CVE: CVE-2022-24112