NA

CVE-2022-2255

Published: 25/08/2022 Updated: 01/10/2022
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an malicious user to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

modwsgi mod wsgi

debian debian linux 10.0

Vendor Advisories

Debian Bug report logs - #1016476 mod-wsgi: CVE-2022-2255: Trusted Proxy Headers Removing Bypass Package: src:mod-wsgi; Maintainer for src:mod-wsgi is Debian Python Team <team+python@trackerdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 1 Aug 2022 11:39:01 UTC Severity: important Tags ...
A vulnerability was found in mod_wsgi The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing (CVE-2022-2255) ...
A vulnerability was found in mod_wsgi The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing ...