A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-3111-1 | mod-wsgi security update |
![]() |
EUVD-2022-0159 | A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing. |
![]() |
GHSA-7527-8855-9cf8 | Incorrect header handling in mod-wsgi |
![]() |
USN-5551-1 | mod-wsgi vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 13 May 2025 06:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat enterprise Linux |
|
CPEs | cpe:/a:redhat:enterprise_linux:8 | |
Vendors & Products |
Redhat
Redhat enterprise Linux |

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T00:32:09.572Z
Reserved: 2022-06-29T00:00:00
Link: CVE-2022-2255

No data.

Status : Modified
Published: 2022-08-25T18:15:09.993
Modified: 2024-11-21T07:00:37.660
Link: CVE-2022-2255


No data.