You are viewing a plain text version of this content. The canonical link for it is here.
Posted to notifications@apisix.apache.org by GitBox <gi...@apache.org> on 2022/02/12 05:45:13 UTC

[GitHub] [apisix-website] moonming commented on a change in pull request #878: docs: add CVE-2022-24112 blog

moonming commented on a change in pull request #878:
URL: https://github.com/apache/apisix-website/pull/878#discussion_r805122104



##########
File path: website/blog/2022/02/11/cve-2022-24112.md
##########
@@ -0,0 +1,49 @@
+---
+title: "Apache APISIX Risk Notice for Rewriting X-REAL-IP Header (CVE-2022-24112)"

Review comment:
       Vulnerability, not `Risk Notice`

##########
File path: website/blog/2022/02/11/cve-2022-24112.md
##########
@@ -0,0 +1,49 @@
+---
+title: "Apache APISIX Risk Notice for Rewriting X-REAL-IP Header (CVE-2022-24112)"
+keywords: 
+- Risk Notice
+- Header
+- IP restrictions
+- CHAITIN
+description: In versions prior to Apache APISIX 2.12.1, there is a risk of rewriting X-REAL-IP header after enabling the Apache APISIX `batch- requests` plug-in. Now the processing information will be announced.

Review comment:
       batch-requests

##########
File path: website/blog/2022/02/11/cve-2022-24112.md
##########
@@ -0,0 +1,49 @@
+---
+title: "Apache APISIX Risk Notice for Rewriting X-REAL-IP Header (CVE-2022-24112)"
+keywords: 
+- Risk Notice

Review comment:
       Vulnerability

##########
File path: website/blog/2022/02/11/cve-2022-24112.md
##########
@@ -0,0 +1,49 @@
+---
+title: "Apache APISIX Risk Notice for Rewriting X-REAL-IP Header (CVE-2022-24112)"
+keywords: 
+- Risk Notice
+- Header

Review comment:
       CVE-2022-24112




-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: notifications-unsubscribe@apisix.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org