kingmouse-yx opened a new issue, #7330:
URL: https://github.com/apache/apisix/issues/7330

   ### Description
   
   At present, in the test environment, the security team has found a high-risk 
vulnerability: ETCD REST API unauthorized access vulnerability. 
   I'd like to ask what remedial measures are available for this apifix? In 
other words, will my basic authentication (role-based access control) of ETCD 
affect the functions of apisix? How should I deal with this vulnerability?
   
   ### Environment
   
   - pisix version (cmd: apisix version): 2.13.0-alpine
   - S (cmd: uname -a): Darwin kingmouse.local 21.4.0 Darwin Kernel Version 
21.4.0: Mon Feb 21 20:36:53 PST 2022; root:xnu-8020.101.4~2/RELEASE_ARM64_T8101 
arm64
   - penResty / Nginx version (cmd: nginx -V or openresty -V): 
openresty/1.19.3.1
   - tcd version, if have (cmd: run curl http://127.0.0.1:9090/v1/server_info 
to get the info from server-info API): 3.4.0
   - pisix-dashboard version, if have: 2.10.1
   - he plugin runner version, if the issue is about a plugin runner (cmd: 
depended on the kind of runner):
   - uarocks version, if the issue is about installation (cmd: luarocks 
--version):
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]

Reply via email to