This is an automated email from the ASF dual-hosted git repository.

juzhiyuan pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/apisix-website.git


The following commit(s) were added to refs/heads/master by this push:
     new 6a07b0d  fix: update CVE-2022-24112 blog details (#880)
6a07b0d is described below

commit 6a07b0d8e9c98a575ab4eda3202eb793eca762ae
Author: Sylvia <[email protected]>
AuthorDate: Mon Feb 14 10:30:45 2022 +0800

    fix: update CVE-2022-24112 blog details (#880)
---
 website/blog/2022/02/11/cve-2022-24112.md | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/website/blog/2022/02/11/cve-2022-24112.md 
b/website/blog/2022/02/11/cve-2022-24112.md
index 41bb04e..a007544 100644
--- a/website/blog/2022/02/11/cve-2022-24112.md
+++ b/website/blog/2022/02/11/cve-2022-24112.md
@@ -1,7 +1,7 @@
 ---
-title: "Apache APISIX Risk Notice for Rewriting X-REAL-IP Header 
(CVE-2022-24112)"
+title: "Apache APISIX Vulnerability for Rewriting X-REAL-IP Header 
(CVE-2022-24112)"
 keywords: 
-- Risk Notice
+- Vulnerability
 - Header
 - IP restrictions
 - CHAITIN
@@ -9,7 +9,7 @@ description: In versions prior to Apache APISIX 2.12.1, there 
is a risk of rewri
 tags: [Security]
 ---
 
-> In versions prior to Apache APISIX 2.12.1, there is a risk of rewriting 
X-REAL-IP header after enabling the Apache APISIX `batch- requests` plug-in. 
Now the processing information will be announced.
+> In versions prior to Apache APISIX 2.12.1, there is a risk of rewriting 
X-REAL-IP header after enabling the Apache APISIX `batch-requests` plug-in. Now 
the processing information will be announced.
 
 <!--truncate-->
 

Reply via email to