Description
A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3111-1 | mod-wsgi security update |
EUVD |
EUVD-2022-0159 | A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing. |
Github GHSA |
GHSA-7527-8855-9cf8 | Incorrect header handling in mod-wsgi |
Ubuntu USN |
USN-5551-1 | mod-wsgi vulnerability |
References
History
Tue, 13 May 2025 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| CPEs | cpe:/a:redhat:enterprise_linux:8 | |
| Vendors & Products |
Redhat
Redhat enterprise Linux |
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T00:32:09.572Z
Reserved: 2022-06-29T00:00:00.000Z
Link: CVE-2022-2255
No data.
Status : Modified
Published: 2022-08-25T18:15:09.993
Modified: 2024-11-21T07:00:37.660
Link: CVE-2022-2255
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA
Ubuntu USN