CVE Vulnerabilities

CVE-2022-2255

Use of Less Trusted Source

Published: Aug 25, 2022 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
7.3 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.

Weakness

The product has two different sources of the same data or information, but it uses the source that has less support for verification, is less trusted, or is less resistant to attack.

Affected Software

NameVendorStart VersionEnd Version
Mod_wsgiModwsgi*4.9.3 (excluding)
Red Hat Enterprise Linux 8RedHatpython39:3.9-8100020250430153343.d47b87a4*
Mod-wsgiUbuntubionic*
Mod-wsgiUbuntudevel*
Mod-wsgiUbuntuesm-infra/bionic*
Mod-wsgiUbuntuesm-infra/focal*
Mod-wsgiUbuntufocal*
Mod-wsgiUbuntujammy*
Mod-wsgiUbuntukinetic*
Mod-wsgiUbuntutrusty*
Mod-wsgiUbuntuxenial*

References