Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7527-8855-9cf8

Опубликовано: 26 авг. 2022
Источник: github
Github: Прошло ревью
CVSS4: 8.7
CVSS3: 7.5

Описание

Incorrect header handling in mod-wsgi

A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.

Пакеты

Наименование

mod-wsgi

pip
Затронутые версииВерсия исправления

< 4.9.3

4.9.3

EPSS

Процентиль: 56%
0.00332
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-345

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 3 лет назад

A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.

CVSS3: 7.3
redhat
больше 3 лет назад

A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.

CVSS3: 7.5
nvd
около 3 лет назад

A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.

CVSS3: 7.5
msrc
около 3 лет назад

A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.

CVSS3: 7.5
debian
около 3 лет назад

A vulnerability was found in mod_wsgi. The X-Client-IP header is not r ...

EPSS

Процентиль: 56%
0.00332
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-345