A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.
The product has two different sources of the same data or information, but it uses the source that has less support for verification, is less trusted, or is less resistant to attack.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Mod_wsgi | Modwsgi | * | 4.9.3 (excluding) |
Mod-wsgi | Ubuntu | bionic | * |
Mod-wsgi | Ubuntu | devel | * |
Mod-wsgi | Ubuntu | focal | * |
Mod-wsgi | Ubuntu | jammy | * |
Mod-wsgi | Ubuntu | kinetic | * |
Mod-wsgi | Ubuntu | trusty | * |
Mod-wsgi | Ubuntu | xenial | * |