CVE-2021-33190

In Apache APISIX Dashboard version 2.6, we changed the default value of listen host to 0.0.0.0 in order to facilitate users to configure external network access. In the IP allowed list restriction, a risky function was used for the IP acquisition, which made it possible to bypass the network limit. At the same time, the default account and password are fixed.Ultimately these factors lead to the issue of security risks. This issue is fixed in APISIX Dashboard 2.6.1
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:apisix_dashboard:2.6:*:*:*:*:*:*:*

History

21 Nov 2024, 06:08

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2021/06/08/4 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2021/06/08/4 - Mailing List, Third Party Advisory
References () https://lists.apache.org/thread.html/re736aea55e8fd2478f0739c0c38a9375c4204fc1f0bd1ea687f57049%40%3Cdev.apisix.apache.org%3E - Mailing List, Vendor Advisory () https://lists.apache.org/thread.html/re736aea55e8fd2478f0739c0c38a9375c4204fc1f0bd1ea687f57049%40%3Cdev.apisix.apache.org%3E - Mailing List, Vendor Advisory

22 Jun 2021, 20:39

Type Values Removed Values Added
References (CONFIRM) https://lists.apache.org/thread.html/re736aea55e8fd2478f0739c0c38a9375c4204fc1f0bd1ea687f57049%40%3Cdev.apisix.apache.org%3E - (CONFIRM) https://lists.apache.org/thread.html/re736aea55e8fd2478f0739c0c38a9375c4204fc1f0bd1ea687f57049%40%3Cdev.apisix.apache.org%3E - Mailing List, Vendor Advisory
References (MLIST) http://www.openwall.com/lists/oss-security/2021/06/08/4 - (MLIST) http://www.openwall.com/lists/oss-security/2021/06/08/4 - Mailing List, Third Party Advisory
References (MLIST) https://lists.apache.org/thread.html/re736aea55e8fd2478f0739c0c38a9375c4204fc1f0bd1ea687f57049@%3Cdev.apisix.apache.org%3E - (MLIST) https://lists.apache.org/thread.html/re736aea55e8fd2478f0739c0c38a9375c4204fc1f0bd1ea687f57049@%3Cdev.apisix.apache.org%3E - Mailing List, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 5.3
CWE CWE-307
CPE cpe:2.3:a:apache:apisix_dashboard:2.6:*:*:*:*:*:*:*

08 Jun 2021, 18:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2021/06/08/4 -

08 Jun 2021, 16:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.apache.org/thread.html/re736aea55e8fd2478f0739c0c38a9375c4204fc1f0bd1ea687f57049@%3Cdev.apisix.apache.org%3E -
Summary In Apache APISIX Dashboard version 2.6, we changed the default value of listen host to 0.0.0.0 in order to facilitate users to configure external network access. In the IP allowed list restriction, a risky function was used for the IP acquisition, which made it possible to bypass the network limit. At the same time, the default account and password are fixed.Ultimately these factors lead to the issue of security risks. This issue is fixed in APISIX Dashboard 2.6.1 In Apache APISIX Dashboard version 2.6, we changed the default value of listen host to 0.0.0.0 in order to facilitate users to configure external network access. In the IP allowed list restriction, a risky function was used for the IP acquisition, which made it possible to bypass the network limit. At the same time, the default account and password are fixed.Ultimately these factors lead to the issue of security risks. This issue is fixed in APISIX Dashboard 2.6.1

08 Jun 2021, 15:17

Type Values Removed Values Added
New CVE

Information

Published : 2021-06-08 15:15

Updated : 2024-11-21 06:08


NVD link : CVE-2021-33190

Mitre link : CVE-2021-33190

CVE.ORG link : CVE-2021-33190


JSON object : View

Products Affected

apache

  • apisix_dashboard
CWE
CWE-307

Improper Restriction of Excessive Authentication Attempts