id: CVE-2022-23944 info: name: Apache ShenYu Admin Unauth Access author: cckuakilong severity: critical description: Apache ShenYu suffers from an unauthorized access vulnerability where a user can access /plugin api without authentication. This issue affected Apache ShenYu 2.4.0 and 2.4.1. remediation: Upgrade to Apache ShenYu (incubating) 2.4.2 or apply the appropriate patch. reference: - https://github.com/apache/incubator-shenyu/pull/2462 - https://nvd.nist.gov/vuln/detail/CVE-2022-23944 - https://github.com/cckuailong/reapoc/blob/main/2022/CVE-2022-23944/vultarget/README.md - https://lists.apache.org/thread/dbrjnnlrf80dr0f92k5r2ysfvf1kr67y - http://www.openwall.com/lists/oss-security/2022/01/25/15 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N cvss-score: 9.1 cve-id: CVE-2022-23944 cwe-id: CWE-306,CWE-862 epss-score: 0.46036 epss-percentile: 0.97052 cpe: cpe:2.3:a:apache:shenyu:2.4.0:*:*:*:*:*:*:* metadata: max-request: 1 vendor: apache product: shenyu tags: cve,cve2022,shenyu,unauth,apache http: - method: GET path: - "{{BaseURL}}/plugin" matchers-condition: and matchers: - type: word part: body words: - '"message":"query success"' - '"code":200' condition: and - type: status status: - 200 # digest: 4b0a00483046022100d92b4c9bcb43afe9307529fc12209b0d04a8e9445f14a801eee888279fe70712022100931df3fcc0f7c891e9e9afc433557cd8d2e5f336ba194817677707f47ad1ebc1:922c64590222798bb761d5b6d8e72950