kingmouse-yx opened a new issue, #7330: URL: https://github.com/apache/apisix/issues/7330
### Description At present, in the test environment, the security team has found a high-risk vulnerability: ETCD REST API unauthorized access vulnerability. I'd like to ask what remedial measures are available for this apifix? In other words, will my basic authentication (role-based access control) of ETCD affect the functions of apisix? How should I deal with this vulnerability? ### Environment - pisix version (cmd: apisix version): 2.13.0-alpine - S (cmd: uname -a): Darwin kingmouse.local 21.4.0 Darwin Kernel Version 21.4.0: Mon Feb 21 20:36:53 PST 2022; root:xnu-8020.101.4~2/RELEASE_ARM64_T8101 arm64 - penResty / Nginx version (cmd: nginx -V or openresty -V): openresty/1.19.3.1 - tcd version, if have (cmd: run curl http://127.0.0.1:9090/v1/server_info to get the info from server-info API): 3.4.0 - pisix-dashboard version, if have: 2.10.1 - he plugin runner version, if the issue is about a plugin runner (cmd: depended on the kind of runner): - uarocks version, if the issue is about installation (cmd: luarocks --version): -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: [email protected] For queries about this service, please contact Infrastructure at: [email protected]
