This is an automated email from the ASF dual-hosted git repository.
juzhiyuan pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/apisix-website.git
The following commit(s) were added to refs/heads/master by this push:
new 6a07b0d fix: update CVE-2022-24112 blog details (#880)
6a07b0d is described below
commit 6a07b0d8e9c98a575ab4eda3202eb793eca762ae
Author: Sylvia <[email protected]>
AuthorDate: Mon Feb 14 10:30:45 2022 +0800
fix: update CVE-2022-24112 blog details (#880)
---
website/blog/2022/02/11/cve-2022-24112.md | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/website/blog/2022/02/11/cve-2022-24112.md
b/website/blog/2022/02/11/cve-2022-24112.md
index 41bb04e..a007544 100644
--- a/website/blog/2022/02/11/cve-2022-24112.md
+++ b/website/blog/2022/02/11/cve-2022-24112.md
@@ -1,7 +1,7 @@
---
-title: "Apache APISIX Risk Notice for Rewriting X-REAL-IP Header
(CVE-2022-24112)"
+title: "Apache APISIX Vulnerability for Rewriting X-REAL-IP Header
(CVE-2022-24112)"
keywords:
-- Risk Notice
+- Vulnerability
- Header
- IP restrictions
- CHAITIN
@@ -9,7 +9,7 @@ description: In versions prior to Apache APISIX 2.12.1, there
is a risk of rewri
tags: [Security]
---
-> In versions prior to Apache APISIX 2.12.1, there is a risk of rewriting
X-REAL-IP header after enabling the Apache APISIX `batch- requests` plug-in.
Now the processing information will be announced.
+> In versions prior to Apache APISIX 2.12.1, there is a risk of rewriting
X-REAL-IP header after enabling the Apache APISIX `batch-requests` plug-in. Now
the processing information will be announced.
<!--truncate-->