From 51dd8b488beb696f06fa39fc757819694a5031a6 Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Mon, 28 Feb 2022 14:56:46 -0500 Subject: [PATCH] Enhancement: cves/2021/CVE-2021-45232.yaml by mp --- cves/2021/CVE-2021-45232.yaml | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-45232.yaml b/cves/2021/CVE-2021-45232.yaml index d524c6ff99..68e392b0c3 100644 --- a/cves/2021/CVE-2021-45232.yaml +++ b/cves/2021/CVE-2021-45232.yaml @@ -1,10 +1,11 @@ id: CVE-2021-45232 info: - name: Apache APISIX Dashboard api unauth access + name: Apache APISIX Dashboard API Unauthorized Access author: Mr-xn severity: critical - description: In Apache APISIX Dashboard before 2.10.1, the Manager API uses two frameworks and introduces framework `droplet` on the basis of framework `gin`, all APIs and authentication middleware are developed based on framework `droplet`, but some API directly use the interface of framework `gin` thus bypassing the authentication. + description: In Apache APISIX Dashboard before 2.10.1, the Manager API uses two frameworks and introduces framework `droplet` on the basis of framework `gin.' While all APIs and authentication middleware are developed based on framework `droplet`, some API directly use the interface of framework `gin` thus bypassing their authentication. + remediation: Upgrade to release 2.10.1 or later. Or, change the default username and password, and restrict the source IP to access the Apache APISIX Dashboard. reference: - https://apisix.apache.org/zh/blog/2021/12/28/dashboard-cve-2021-45232/ - https://github.com/pingpongcult/CVE-2021-45232 @@ -33,3 +34,5 @@ requests: - type: status status: - 200 + +# Enhanced by mp on 2022/02/28