Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-2255

Опубликовано: 25 авг. 2022
Источник: debian
EPSS Низкий

Описание

A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
mod-wsgifixed4.9.0-1.1package
mod-wsgifixed4.7.1-3+deb11u1bullseyepackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=2100563

  • https://github.com/GrahamDumpleton/mod_wsgi/commit/af3c0c2736bc0b0b01fa0f0aad3c904b7fa9c751 (4.9.3)

  • WSGITrustedProxies and vulnerable code introduced in https://github.com/GrahamDumpleton/mod_wsgi/commit/543fc33c23b4cb5e623d574b7efbf85c8dedb396 (4.4.10)

EPSS

Процентиль: 43%
0.00203
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 3 года назад

A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.

CVSS3: 7.3
redhat
почти 3 года назад

A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.

CVSS3: 7.5
nvd
почти 3 года назад

A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.

suse-cvrf
больше 2 лет назад

Security update for apache2-mod_wsgi

suse-cvrf
больше 2 лет назад

Security update for apache2-mod_wsgi

EPSS

Процентиль: 43%
0.00203
Низкий