CVE-2021-33190
Bypass network access control
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In Apache APISIX Dashboard version 2.6, we changed the default value of listen host to 0.0.0.0 in order to facilitate users to configure external network access. In the IP allowed list restriction, a risky function was used for the IP acquisition, which made it possible to bypass the network limit. At the same time, the default account and password are fixed.Ultimately these factors lead to the issue of security risks. This issue is fixed in APISIX Dashboard 2.6.1
En Apache APISIX Dashboard versión 2.6, hemos cambiado el valor por defecto de listen host a 0.0.0.0 para facilitar a usuarios la configuración del acceso a la red externa. En la restricción de la lista de IPs permitidas, una función risky fue usada para la adquisición de IPs, lo que hizo posible omitir el límite de la red. Al mismo tiempo, la cuenta y la contraseña predeterminadas son fijas. En última instancia, estos factores conllevan al problema de riesgos de seguridad. Este problema es corregido en APISIX Dashboard versión 2.6.1
CVSS Scores
SSVC
- Decision:-
Timeline
- 2021-05-19 CVE Reserved
- 2021-06-08 CVE Published
- 2024-04-30 EPSS Updated
- 2024-08-03 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-307: Improper Restriction of Excessive Authentication Attempts
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2021/06/08/4 | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apache Search vendor "Apache" | Apisix Dashboard Search vendor "Apache" for product "Apisix Dashboard" | 2.6 Search vendor "Apache" for product "Apisix Dashboard" and version "2.6" | - |
Affected
|