Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9wxc-375c-cvq2

Опубликовано: 23 нояб. 2021
Источник: github
Github: Не прошло ревью

Описание

The uri-block plugin in Apache APISIX before 2.10.2 uses $request_uri without verification. The $request_uri is the full original request URI without normalization. This makes it possible to construct a URI to bypass the block list on some occasions. For instance, when the block list contains "^/internal/", a URI like //internal/ can be used to bypass it. Some other plugins also have the same issue. And it may affect the developer's custom plugin.

The uri-block plugin in Apache APISIX before 2.10.2 uses $request_uri without verification. The $request_uri is the full original request URI without normalization. This makes it possible to construct a URI to bypass the block list on some occasions. For instance, when the block list contains "^/internal/", a URI like //internal/ can be used to bypass it. Some other plugins also have the same issue. And it may affect the developer's custom plugin.

EPSS

Процентиль: 98%
0.58257
Средний

Дефекты

CWE-77

Связанные уязвимости

CVSS3: 7.5
nvd
около 4 лет назад

The uri-block plugin in Apache APISIX before 2.10.2 uses $request_uri without verification. The $request_uri is the full original request URI without normalization. This makes it possible to construct a URI to bypass the block list on some occasions. For instance, when the block list contains "^/internal/", a URI like `//internal/` can be used to bypass it. Some other plugins also have the same issue. And it may affect the developer's custom plugin.

CVSS3: 7.5
fstec
около 4 лет назад

Уязвимость плагина uri-block облачного API-шлюза Apache APISIX, позволяющая нарушителю обойти ограничений безопасности

EPSS

Процентиль: 98%
0.58257
Средний

Дефекты

CWE-77