{"vulnerability": "CVE-2020-13945", "sightings": [{"uuid": "b5f3b6a0-bd5d-4ef9-8961-fd7bee73a226", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13945", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:44.000000Z"}, {"uuid": "45742141-ea66-41de-a1e6-362b76d5033e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13945", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:24.000000Z"}, {"uuid": "9c24add4-875f-47f2-9a04-9eb315c52a77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13945", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8042", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aA PoC exploit for CVE-2020-13945 - Apache APISIX Remote Code Execution (RCE)\nURL\uff1ahttps://github.com/K3ysTr0K3R/CVE-2020-13945-EXPLOIT\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2024-07-21T16:48:18.000000Z"}, {"uuid": "6435b2f5-8e86-44b8-aa59-4253eee7c027", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13945", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/apache_apisix_api_default_token_rce.rb", "content": "", "creation_timestamp": "2022-03-07T15:23:16.000000Z"}, {"uuid": "e01731f9-a658-4da5-a177-a4fc56c4412e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13945", "type": "seen", "source": "https://t.me/cibsecurity/17209", "content": "\u203c CVE-2020-13945 \u203c\n\nIn Apache APISIX, the user enabled the Admin API and deleted the Admin API access IP restriction rules. Eventually, the default token is allowed to access APISIX management data. This affects versions 1.2, 1.3, 1.4, 1.5.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-07T22:30:20.000000Z"}, {"uuid": "5825c5b2-5fb9-4e80-a91d-65c36b903f0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13945", "type": "seen", "source": "https://t.me/arpsyndicate/1883", "content": "#ExploitObserverAlert\n\nCVE-2020-13945\n\nDESCRIPTION: Exploit Observer has 19 entries related to CVE-2020-13945. In Apache APISIX, the user enabled the Admin API and deleted the Admin API access IP restriction rules. Eventually, the default token is allowed to access APISIX management data. This affects versions 1.2, 1.3, 1.4, 1.5.\n\nFIRST-EPSS: 0.005580000\nNVD-IS: 3.6\nNVD-ES: 2.8", "creation_timestamp": "2023-12-18T01:40:59.000000Z"}]}