{"containers":{"cna":{"affected":[{"product":"Apache APISIX","vendor":"Apache Software Foundation","versions":[{"status":"affected","version":"1.2"},{"status":"affected","version":"1.3"},{"status":"affected","version":"1.4"},{"status":"affected","version":"1.5"}]}],"descriptions":[{"lang":"en","value":"In Apache APISIX, the user enabled the Admin API and deleted the Admin API access IP restriction rules. Eventually, the default token is allowed to access APISIX management data. This affects versions 1.2, 1.3, 1.4, 1.5."}],"problemTypes":[{"descriptions":[{"description":"Admin API default access token vulnerability","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2022-03-07T17:06:17.000Z","orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://lists.apache.org/thread.html/r792feb29964067a4108f53e8579a1e9bd1c8b5b9bc95618c814faf2f%40%3Cdev.apisix.apache.org%3E"},{"tags":["x_refsource_MISC"],"url":"http://packetstormsecurity.com/files/166228/Apache-APISIX-Remote-Code-Execution.html"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security@apache.org","ID":"CVE-2020-13945","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Apache APISIX","version":{"version_data":[{"version_value":"1.2"},{"version_value":"1.3"},{"version_value":"1.4"},{"version_value":"1.5"}]}}]},"vendor_name":"Apache Software Foundation"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In Apache APISIX, the user enabled the Admin API and deleted the Admin API access IP restriction rules. Eventually, the default token is allowed to access APISIX management data. This affects versions 1.2, 1.3, 1.4, 1.5."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Admin API default access token vulnerability"}]}]},"references":{"reference_data":[{"name":"https://lists.apache.org/thread.html/r792feb29964067a4108f53e8579a1e9bd1c8b5b9bc95618c814faf2f%40%3Cdev.apisix.apache.org%3E","refsource":"CONFIRM","url":"https://lists.apache.org/thread.html/r792feb29964067a4108f53e8579a1e9bd1c8b5b9bc95618c814faf2f%40%3Cdev.apisix.apache.org%3E"},{"name":"http://packetstormsecurity.com/files/166228/Apache-APISIX-Remote-Code-Execution.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/166228/Apache-APISIX-Remote-Code-Execution.html"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T12:32:14.572Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://lists.apache.org/thread.html/r792feb29964067a4108f53e8579a1e9bd1c8b5b9bc95618c814faf2f%40%3Cdev.apisix.apache.org%3E"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://packetstormsecurity.com/files/166228/Apache-APISIX-Remote-Code-Execution.html"}]}]},"cveMetadata":{"assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","assignerShortName":"apache","cveId":"CVE-2020-13945","datePublished":"2020-12-07T19:04:52.000Z","dateReserved":"2020-06-08T00:00:00.000Z","dateUpdated":"2024-08-04T12:32:14.572Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}