4
CVSSv2

CVE-2020-13945

Published: 07/12/2020 Updated: 19/04/2022
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Vulnerability Summary

In Apache APISIX, the user enabled the Admin API and deleted the Admin API access IP restriction rules. Eventually, the default token is allowed to access APISIX management data. This affects versions 1.2, 1.3, 1.4, 1.5.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache apisix

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> [SECURITY] CVE-2020-13945: Apache APISIX's Admin API default access token vulnerability <!--X-Subject-Header-End--> <!--X-Head ...

Github Repositories

Apisix系列漏洞:未授权漏洞(CVE-2021-45232)、默认秘钥(CVE-2020-13945)批量探测。

Apisix_Crack 概述 Apisix系列漏洞探测利用工具,包括未授权访问漏洞(CVE-2021-45232)和默认秘钥漏洞(CVE-2020-13945),支持批量探测利用。 使用方法 批量探测:文件中逐行写入需要检测的URL,参数-TF 指定文件 -t 并发数量 单个目标探测:-T xxxx 执行效果 玉兔安全致力于web安全、红蓝