A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "4.5.17-1ubuntu1.1", "binary_name": "libapache2-mod-wsgi" }, { "binary_version": "4.5.17-1ubuntu1.1", "binary_name": "libapache2-mod-wsgi-py3" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "4.6.8-1ubuntu3.1", "binary_name": "libapache2-mod-wsgi" }, { "binary_version": "4.6.8-1ubuntu3.1", "binary_name": "libapache2-mod-wsgi-py3" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "4.9.0-1ubuntu0.1", "binary_name": "libapache2-mod-wsgi-py3" } ] }