CVE-2021-33190

In Apache APISIX Dashboard version 2.6, we changed the default value of listen host to 0.0.0.0 in order to facilitate users to configure external network access. In the IP allowed list restriction, a risky function was used for the IP acquisition, which made it possible to bypass the network limit. At the same time, the default account and password are fixed.Ultimately these factors lead to the issue of security risks. This issue is fixed in APISIX Dashboard 2.6.1
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:apisix_dashboard:2.6:*:*:*:*:*:*:*

History

21 Nov 2024, 06:08

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2021/06/08/4 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2021/06/08/4 - Mailing List, Third Party Advisory
References () https://lists.apache.org/thread.html/re736aea55e8fd2478f0739c0c38a9375c4204fc1f0bd1ea687f57049%40%3Cdev.apisix.apache.org%3E - Mailing List, Vendor Advisory () https://lists.apache.org/thread.html/re736aea55e8fd2478f0739c0c38a9375c4204fc1f0bd1ea687f57049%40%3Cdev.apisix.apache.org%3E - Mailing List, Vendor Advisory

07 Nov 2023, 03:35

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/re736aea55e8fd2478f0739c0c38a9375c4204fc1f0bd1ea687f57049@%3Cdev.apisix.apache.org%3E', 'name': '[apisix-dev] 20210608 CVE-2021-33190: Apache APISIX Dashboard: Bypass network access control', 'tags': ['Mailing List', 'Vendor Advisory'], 'refsource': 'MLIST'}

Information

Published : 2021-06-08 15:15

Updated : 2024-11-21 06:08


NVD link : CVE-2021-33190

Mitre link : CVE-2021-33190

CVE.ORG link : CVE-2021-33190


JSON object : View

Products Affected

apache

  • apisix_dashboard
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts