Apollo has potential access control security issue in eureka
Description
Apollo is a configuration management system. Prior to version 2.1.0, there are potential security issues if users expose apollo-configservice to the internet, which is not recommended. This is because there is no authentication feature enabled for the built-in eureka service. Malicious hackers may access eureka directly to mock apollo-configservice and apollo-adminservice. Login authentication for eureka was added in version 2.1.0. As a workaround, avoid exposing apollo-configservice to the internet.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
com.ctrip.framework.apollo:apolloMaven | < 2.1.0 | 2.1.0 |
Affected products
1- Range: < 2.1.0
Patches
17df79bf8df69Enable login authentication for eureka
7 files changed · +106 −2
apollo-configservice/src/main/java/com/ctrip/framework/apollo/configservice/ConfigServerEurekaServerConfigure.java+46 −0 modified@@ -16,9 +16,16 @@ */ package com.ctrip.framework.apollo.configservice; +import org.springframework.beans.factory.annotation.Autowired; +import org.springframework.beans.factory.annotation.Value; import org.springframework.boot.autoconfigure.condition.ConditionalOnProperty; import org.springframework.cloud.netflix.eureka.server.EnableEurekaServer; import org.springframework.context.annotation.Configuration; +import org.springframework.core.annotation.Order; +import org.springframework.security.config.annotation.authentication.builders.AuthenticationManagerBuilder; +import org.springframework.security.config.annotation.authentication.configurers.provisioning.InMemoryUserDetailsManagerConfigurer; +import org.springframework.security.config.annotation.web.builders.HttpSecurity; +import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter; /** * Start Eureka Server annotations according to configuration @@ -29,4 +36,43 @@ @EnableEurekaServer @ConditionalOnProperty(name = "apollo.eureka.server.enabled", havingValue = "true", matchIfMissing = true) public class ConfigServerEurekaServerConfigure { + + @Order(99) + @Configuration + static class EurekaServerSecurityConfigurer extends WebSecurityConfigurerAdapter { + + private static final String EUREKA_ROLE = "EUREKA"; + + @Value("${apollo.eureka.server.security.enabled:false}") + private boolean eurekaSecurityEnabled; + @Value("${apollo.eureka.server.security.username:}") + private String username; + @Value("${apollo.eureka.server.security.password:}") + private String password; + + @Override + protected void configure(HttpSecurity http) throws Exception { + http.csrf().disable(); + http.httpBasic(); + if (eurekaSecurityEnabled) { + http.authorizeRequests() + .antMatchers("/eureka/apps/**", "/eureka/instances/**", "/eureka/peerreplication/**") + .hasRole(EUREKA_ROLE) + .antMatchers("/**").permitAll(); + } + } + + @Autowired + public void configureEurekaUser(AuthenticationManagerBuilder auth) throws Exception { + if (!eurekaSecurityEnabled) { + return; + } + InMemoryUserDetailsManagerConfigurer<AuthenticationManagerBuilder> configurer = auth + .getConfigurer(InMemoryUserDetailsManagerConfigurer.class); + if (configurer == null) { + configurer = auth.inMemoryAuthentication(); + } + configurer.withUser(username).password(password).roles(EUREKA_ROLE); + } + } }
apollo-configservice/src/test/java/com/ctrip/framework/apollo/configservice/controller/TestWebSecurityConfig.java+1 −1 modified@@ -22,7 +22,7 @@ import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter; @Configuration -@Order(99) +@Order(98) public class TestWebSecurityConfig extends WebSecurityConfigurerAdapter { @Override
CHANGES.md+1 −0 modified@@ -39,6 +39,7 @@ Apollo 2.1.0 * [feat: use can change spring.profiles.active's value without rebuild project](https://github.com/apolloconfig/apollo/pull/4616) * [refactor: remove app.properties and move some config file's location](https://github.com/apolloconfig/apollo/pull/4637) * [Fix the problem of deleting blank items appear at the end](https://github.com/apolloconfig/apollo/pull/4662) +* [Enable login authentication for eureka](https://github.com/apolloconfig/apollo/pull/4663) ------------------ All issues and pull requests are [here](https://github.com/apolloconfig/apollo/milestone/11?closed=1)
docs/en/deployment/distributed-deployment-guide.md+28 −0 modified@@ -1528,3 +1528,31 @@ admin-services.access.tokens=098f6bcd4621d373cade4e832627b4f6,ad0234829205b90331 > For version 2.0.0 and above The default value is 60, in seconds. Since the key authentication needs to verify the time, there may be time deviation between the time of the client and the time of the server, if the deviation is too large, the authentication will fail, this configuration can configure the tolerated time deviation size, the default is 60 seconds. + +### 3.2.9 apollo.eureka.server.security.enabled - Configure whether to enable Eureka login authentication + +> For version 2.1.0 and above + +The default value is false, if you want to improve security (such as when apollo is exposed to the public network), you can enable login authentication for eureka by setting this configuration to true. + +Note that if eureka login authentication is enabled, the addresses in [eureka.service.url](#_321-eurekaserviceurl-eureka-service-url) needs to be configured with a user name and password, such as: + +``` +http://some-user-name:some-password@1.1.1.1:8080/eureka/, http://some-user-name:some-password@2.2.2.2:8080/eureka/ +``` + +Among them, `some-user-name` and `some-password` need to be consistent with the configuration items of `apollo.eureka.server.security.username` and `apollo.eureka.server.security.password`. + +### 3.2.10 apollo.eureka.server.security.username - Configure the username of Eureka server + +> For version 2.1.0 and above + +Configure the login username of eureka server, which needs to be used together with [apollo.eureka.server.security.enabled](#_329-apolloeurekaserversecurityenabled-configure-whether-to-enable-eureka-login-authentication). + +> Note that the username cannot be configured as apollo. + +### 3.2.11 apollo.eureka.server.security.password - Configure the password of Eureka server + +> For version 2.1.0 and above + +Configure the login password of eureka server, which needs to be used together with [apollo.eureka.server.security.enabled](#_329-apolloeurekaserversecurityenabled-configure-whether-to-enable-eureka-login-authentication). \ No newline at end of file
docs/en/usage/apollo-user-guide.md+2 −1 modified@@ -504,4 +504,5 @@ In addition to user permissions, system access also needs to be considered in te 1. `apollo-configservice` and `apollo-adminservice` are designed based on the intranet trusted network, so for security reasons, `apollo-configservice` and `apollo-adminservice` are prohibited from being exposed directly to the public network 2. For sensitive configurations, consider enabling [access secret key](en/usage/apollo-user-guide?id=_62-configuring-access-keys) so that only authenticated clients can access sensitive configurations -3. 1.7.1 and above can consider enabling [access control](en/deployment/distributed-deployment-guide?id=_326-admin-servicesaccesscontrolenabled-configure-whether-apollo-adminservice-has-access-control-enabled) for `apollo-adminservice`, so that only [controlled](en/deployment/distributed-deployment-guide?id=_3112-admin-servicesaccesstokens-set-the-access-token-required-by-apollo-portal-to-access-the-apollo-adminservice-for-each-environment) `apollo-portal` can access the corresponding interface to enhance security +3. version 1.7.1 and above can consider enabling [access control](en/deployment/distributed-deployment-guide?id=_326-admin-servicesaccesscontrolenabled-configure-whether-apollo-adminservice-has-access-control-enabled) for `apollo-adminservice`, so that only [controlled](en/deployment/distributed-deployment-guide?id=_3112-admin-servicesaccesstokens-set-the-access-token-required-by-apollo-portal-to-access-the-apollo-adminservice-for-each-environment) `apollo-portal` can access the corresponding interface to enhance security +4. version 2.1.0 and above can consider enabling [access control](en/deployment/distributed-deployment-guide?id=_329-apolloeurekaserversecurityenabled-configure-whether-to-enable-eureka-login-authentication) for `eureka`, so that only controlled `apollo-configservice` and `apollo-adminservice` can be registered to `eureka` to enhance security \ No newline at end of file
docs/zh/deployment/distributed-deployment-guide.md+27 −0 modified@@ -1470,3 +1470,30 @@ admin-service.access.tokens=098f6bcd4621d373cade4e832627b4f6,ad0234829205b903319 > 适用于2.0.0及以上版本 默认值为60,单位为秒。由于密钥认证时需要校验时间,客户端与服务端的时间可能存在时间偏差,如果偏差太大会导致认证失败,此配置可以配置容忍的时间偏差大小,默认为60秒。 + +### 3.2.9 apollo.eureka.server.security.enabled - 配置是否开启eureka server的登录认证 + +> 适用于2.1.0及以上版本 + +默认为false,如果希望提升安全性(比如公网可访问的场景),可以设置该配置项为true启用登录认证。 + +需要注意的是,开启登录认证后,[eureka.service.url](#_321-eurekaserviceurl-eureka服务url)中的地址需要配置用户名和密码,如: + +``` +http://some-user-name:some-password@1.1.1.1:8080/eureka/,http://some-user-name:some-password@2.2.2.2:8080/eureka/ +``` +其中`some-user-name`和`some-password`需要和`apollo.eureka.server.security.username`以及`apollo.eureka.server.security.password`的配置项一致。 + +### 3.2.10 apollo.eureka.server.security.username - 配置eureka server的登录用户名 + +> 适用于2.1.0及以上版本 + +配置eureka server的登录用户名,需要和[apollo.eureka.server.security.enabled](#_329-apolloeurekaserversecurityenabled-配置是否开启eureka-server的登录认证)一起使用。 + +> 注意用户名不能配置为apollo + +### 3.2.11 apollo.eureka.server.security.password - 配置eureka server的登录密码 + +> 适用于2.1.0及以上版本 + +配置eureka server的登录密码,需要和[apollo.eureka.server.security.enabled](#_329-apolloeurekaserversecurityenabled-配置是否开启eureka-server的登录认证)一起使用。 \ No newline at end of file
docs/zh/usage/apollo-user-guide.md+1 −0 modified@@ -477,3 +477,4 @@ Apollo 支持细粒度的权限控制,请务必根据实际情况做好权限 1. `apollo-configservice`和`apollo-adminservice`是基于内网可信网络设计的,所以出于安全考虑,禁止`apollo-configservice`和`apollo-adminservice`直接暴露在公网 2. 对敏感配置可以考虑开启[访问秘钥](#_62-%e9%85%8d%e7%bd%ae%e8%ae%bf%e9%97%ae%e5%af%86%e9%92%a5),从而只有经过身份验证的客户端才能访问敏感配置 3. 1.7.1及以上版本可以考虑为`apollo-adminservice`开启[访问控制](zh/deployment/distributed-deployment-guide?id=_326-admin-serviceaccesscontrolenabled-配置apollo-adminservice是否开启访问控制),从而只有[受控的](zh/deployment/distributed-deployment-guide?id=_3112-admin-serviceaccesstokens-设置apollo-portal访问各环境apollo-adminservice所需的access-token)`apollo-portal`才能访问对应接口,增强安全性 +4. 2.1.0及以上版本可以考虑为`eureka`开启[访问控制](zh/deployment/distributed-deployment-guide?id=_329-apolloeurekaserversecurityenabled-配置是否开启eureka-server的登录认证),从而只有受控的`apollo-configservice`和`apollo-adminservice`可以注册到`eureka`,增强安全性 \ No newline at end of file
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- github.com/advisories/GHSA-368x-wmmg-hq5cghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-25570ghsaADVISORY
- github.com/apolloconfig/apollo/commit/7df79bf8df6960433ed4ff782a54e3dfc74632bdghsax_refsource_MISCWEB
- github.com/apolloconfig/apollo/pull/4663ghsax_refsource_MISCWEB
- github.com/apolloconfig/apollo/releases/tag/v2.1.0ghsax_refsource_MISCWEB
- github.com/apolloconfig/apollo/security/advisories/GHSA-368x-wmmg-hq5cghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.