First published: Tue Jun 08 2021(Updated: )
In Apache APISIX Dashboard version 2.6, we changed the default value of listen host to 0.0.0.0 in order to facilitate users to configure external network access. In the IP allowed list restriction, a risky function was used for the IP acquisition, which made it possible to bypass the network limit. At the same time, the default account and password are fixed.Ultimately these factors lead to the issue of security risks. This issue is fixed in APISIX Dashboard 2.6.1
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache APISIX Dashboard | =2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-33190 has a medium severity rating due to its potential to allow unauthorized access.
To fix CVE-2021-33190, update Apache APISIX Dashboard to version 2.7 or later.
The impact of CVE-2021-33190 includes the ability for unauthorized users to access the system if IP restrictions are misconfigured.
CVE-2021-33190 affects Apache APISIX Dashboard version 2.6.
Mitigation for CVE-2021-33190 includes reviewing and tightening IP access controls and updating to a secure version.