Описание
A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 4.5.17-1ubuntu1.1 |
| devel | released | 4.9.0-1ubuntu1 |
| esm-infra-legacy/trusty | not-affected | |
| esm-infra/bionic | released | 4.5.17-1ubuntu1.1 |
| esm-infra/focal | released | 4.6.8-1ubuntu3.1 |
| esm-infra/xenial | not-affected | |
| focal | released | 4.6.8-1ubuntu3.1 |
| jammy | released | 4.9.0-1ubuntu0.1 |
| kinetic | released | 4.9.0-1ubuntu1 |
| trusty | ignored | end of standard support |
Показывать по
7.5 High
CVSS3
Связанные уязвимости
A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.
A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.
A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.
A vulnerability was found in mod_wsgi. The X-Client-IP header is not r ...
7.5 High
CVSS3