Описание
Apollo has potential access control security issue in eureka
Impact
If users expose the apollo-configservice to the internet (which is not recommended), there are potential security issues since there is no authentication feature enabled for the built-in eureka service. Malicious hackers may access eureka directly to mock apollo-configservice and apollo-adminservice .
Patches
Login authentication for eureka was added in https://github.com/apolloconfig/apollo/pull/4663 and was released in v2.1.0.
Workarounds
To fix the potential issue without upgrading, simply follow the advice that does not expose apollo-configservice to the internet.
References
For more information
If you have any questions or comments about this advisory:
- Open an issue in issue
- Email us at apollo-config@googlegroups.com
Ссылки
- https://github.com/apolloconfig/apollo/security/advisories/GHSA-368x-wmmg-hq5c
- https://nvd.nist.gov/vuln/detail/CVE-2023-25570
- https://github.com/apolloconfig/apollo/pull/4663
- https://github.com/apolloconfig/apollo/commit/7df79bf8df6960433ed4ff782a54e3dfc74632bd
- https://github.com/apolloconfig/apollo/releases/tag/v2.1.0
Пакеты
com.ctrip.framework.apollo:apollo
< 2.1.0
2.1.0
Связанные уязвимости
Apollo is a configuration management system. Prior to version 2.1.0, there are potential security issues if users expose apollo-configservice to the internet, which is not recommended. This is because there is no authentication feature enabled for the built-in eureka service. Malicious hackers may access eureka directly to mock apollo-configservice and apollo-adminservice. Login authentication for eureka was added in version 2.1.0. As a workaround, avoid exposing apollo-configservice to the internet.