module
APISIX Admin API default access token RCE
Disclosed | Created |
---|---|
2020-12-07 | 2022-03-07 |
Disclosed
2020-12-07
Created
2022-03-07
Description
Apache APISIX has a default, built-in API token edd1c9f034335f136f87ad84b625c8f1 that can be used to access
all of the admin API, which leads to remote LUA code execution through the script parameter added in the 2.x
version. This module also leverages another vulnerability to bypass the IP restriction plugin.
all of the admin API, which leads to remote LUA code execution through the script parameter added in the 2.x
version. This module also leverages another vulnerability to bypass the IP restriction plugin.
Authors
Heyder Andrade eu@heyderandrade.org
YuanSheng Wang membphis@gmail.com
YuanSheng Wang membphis@gmail.com
Platform
Unix
Architectures
cmd
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.