id: CVE-2022-23944 info: name: Apache ShenYu Admin Unauth Access author: cckuakilong severity: critical description: Apache ShenYu suffers from an unauthorized access vulnerability where a user can access /plugin api without authentication. This issue affected Apache ShenYu 2.4.0 and 2.4.1. remediation: Upgrade to Apache ShenYu (incubating) 2.4.2 or apply the appropriate patch. reference: - https://github.com/apache/incubator-shenyu/pull/2462 - https://nvd.nist.gov/vuln/detail/CVE-2022-23944 - https://github.com/cckuailong/reapoc/blob/main/2022/CVE-2022-23944/vultarget/README.md - https://lists.apache.org/thread/dbrjnnlrf80dr0f92k5r2ysfvf1kr67y - http://www.openwall.com/lists/oss-security/2022/01/25/15 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N cvss-score: 9.1 cve-id: CVE-2022-23944 cwe-id: CWE-306,CWE-862 epss-score: 0.71433 epss-percentile: 0.97704 cpe: cpe:2.3:a:apache:shenyu:2.4.0:*:*:*:*:*:*:* metadata: max-request: 1 vendor: apache product: shenyu tags: cve,cve2022,shenyu,unauth,apache http: - method: GET path: - "{{BaseURL}}/plugin" matchers-condition: and matchers: - type: word part: body words: - '"message":"query success"' - '"code":200' condition: and - type: status status: - 200 # digest: 4a0a00473045022032b5d9cdd80d5be7c9e8e8868a889cc7a4827bfd9a0989e8f0596e5c41c26667022100aa5651ab70421f398d91887979b710a768a2f9d435b12466f7322828f34426fa:922c64590222798bb761d5b6d8e72950