It was discovered that mod-wsgi did not correctly remove the X-Client-IP header when processing requests from untrusted proxies. A remote attacker could use this issue to pass the header to WSGI applications, contrary to expectations.
{ "binaries": [ { "binary_version": "4.5.17-1ubuntu1.1", "binary_name": "libapache2-mod-wsgi" }, { "binary_version": "4.5.17-1ubuntu1.1", "binary_name": "libapache2-mod-wsgi-py3" } ], "availability": "No subscription required" }
{ "cves": [ { "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2022-2255" } ], "ecosystem": "Ubuntu:18.04:LTS" }
{ "binaries": [ { "binary_version": "4.6.8-1ubuntu3.1", "binary_name": "libapache2-mod-wsgi" }, { "binary_version": "4.6.8-1ubuntu3.1", "binary_name": "libapache2-mod-wsgi-py3" } ], "availability": "No subscription required" }
{ "cves": [ { "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2022-2255" } ], "ecosystem": "Ubuntu:20.04:LTS" }
{ "binaries": [ { "binary_version": "4.9.0-1ubuntu0.1", "binary_name": "libapache2-mod-wsgi-py3" } ], "availability": "No subscription required" }
{ "cves": [ { "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" }, { "score": "medium", "type": "Ubuntu" } ], "id": "CVE-2022-2255" } ], "ecosystem": "Ubuntu:22.04:LTS" }