CVE Vulnerabilities

CVE-2022-31813

Use of Less Trusted Source

Published: Jun 09, 2022 | Modified: Nov 21, 2024
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
7.3 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Ubuntu
MEDIUM

Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.

Weakness

The product has two different sources of the same data or information, but it uses the source that has less support for verification, is less trusted, or is less resistant to attack.

Affected Software

Name Vendor Start Version End Version
Http_server Apache * 2.4.53 (including)
JBoss Core Services for RHEL 8 RedHat jbcs-httpd24-httpd-0:2.4.51-37.el8jbcs *
JBoss Core Services for RHEL 8 RedHat jbcs-httpd24-mod_http2-0:1.15.19-20.el8jbcs *
JBoss Core Services on RHEL 7 RedHat jbcs-httpd24-httpd-0:2.4.51-37.el7jbcs *
JBoss Core Services on RHEL 7 RedHat jbcs-httpd24-mod_http2-0:1.15.19-20.el7jbcs *
Red Hat Enterprise Linux 8 RedHat httpd:2.4-8070020220725152258.3b9f49c4 *
Red Hat Enterprise Linux 9 RedHat httpd-0:2.4.53-7.el9 *
Red Hat Software Collections for Red Hat Enterprise Linux 7 RedHat httpd24-httpd-0:2.4.34-23.el7.5 *
Text-Only JBCS RedHat httpd *
Apache2 Ubuntu bionic *
Apache2 Ubuntu devel *
Apache2 Ubuntu esm-infra/xenial *
Apache2 Ubuntu focal *
Apache2 Ubuntu impish *
Apache2 Ubuntu jammy *
Apache2 Ubuntu kinetic *
Apache2 Ubuntu trusty/esm *
Apache2 Ubuntu upstream *

References