Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-2255

Опубликовано: 18 июл. 2022
Источник: redhat
CVSS3: 7.3
EPSS Низкий

Описание

A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6mod_wsgiNot affected
Red Hat Enterprise Linux 7mod_wsgiNot affected
Red Hat Enterprise Linux 8mod_wsgiWill not fix
Red Hat Enterprise Linux 8python38:3.8/mod_wsgiWill not fix
Red Hat Enterprise Linux 9mod_wsgiWill not fix
Red Hat Software Collectionspython27-mod_wsgiOut of support scope
Red Hat Software Collectionsrh-python38-mod_wsgiWill not fix
Red Hat Enterprise Linux 8python39FixedRHSA-2025:479112.05.2025

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-348
https://bugzilla.redhat.com/show_bug.cgi?id=2100563mod_wsgi: Trusted Proxy Headers Removing Bypass

EPSS

Процентиль: 43%
0.00203
Низкий

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 3 года назад

A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.

CVSS3: 7.5
nvd
почти 3 года назад

A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.

CVSS3: 7.5
debian
почти 3 года назад

A vulnerability was found in mod_wsgi. The X-Client-IP header is not r ...

suse-cvrf
больше 2 лет назад

Security update for apache2-mod_wsgi

suse-cvrf
больше 2 лет назад

Security update for apache2-mod_wsgi

EPSS

Процентиль: 43%
0.00203
Низкий

7.3 High

CVSS3