A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3111-1 | mod-wsgi security update |
EUVD |
EUVD-2022-0159 | A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing. |
Github GHSA |
GHSA-7527-8855-9cf8 | Incorrect header handling in mod-wsgi |
Ubuntu USN |
USN-5551-1 | mod-wsgi vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 13 May 2025 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| CPEs | cpe:/a:redhat:enterprise_linux:8 | |
| Vendors & Products |
Redhat
Redhat enterprise Linux |
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T00:32:09.572Z
Reserved: 2022-06-29T00:00:00
Link: CVE-2022-2255
No data.
Status : Modified
Published: 2022-08-25T18:15:09.993
Modified: 2024-11-21T07:00:37.660
Link: CVE-2022-2255
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA
Ubuntu USN