CVE Vulnerabilities

CVE-2022-31813

Use of Less Trusted Source

Published: Jun 09, 2022 | Modified: May 01, 2025
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
7.3 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.

Weakness

The product has two different sources of the same data or information, but it uses the source that has less support for verification, is less trusted, or is less resistant to attack.

Affected Software

NameVendorStart VersionEnd Version
Http_serverApache*2.4.54 (excluding)
JBoss Core Services for RHEL 8RedHatjbcs-httpd24-httpd-0:2.4.51-37.el8jbcs*
JBoss Core Services for RHEL 8RedHatjbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-httpd-0:2.4.51-37.el7jbcs*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs*
Red Hat Enterprise Linux 8RedHathttpd:2.4-8070020220725152258.3b9f49c4*
Red Hat Enterprise Linux 9RedHathttpd-0:2.4.53-7.el9*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHathttpd24-httpd-0:2.4.34-23.el7.5*
Text-Only JBCSRedHat*
Apache2Ubuntubionic*
Apache2Ubuntudevel*
Apache2Ubuntuesm-infra-legacy/trusty*
Apache2Ubuntuesm-infra/bionic*
Apache2Ubuntuesm-infra/focal*
Apache2Ubuntuesm-infra/xenial*
Apache2Ubuntufocal*
Apache2Ubuntuimpish*
Apache2Ubuntujammy*
Apache2Ubuntukinetic*
Apache2Ubuntutrusty/esm*
Apache2Ubuntuupstream*

References