It was discovered that mod-wsgi did not correctly remove the X-Client-IP header when processing requests from untrusted proxies. A remote attacker could use this issue to pass the header to WSGI applications, contrary to expectations.
{ "binaries": [ { "binary_name": "libapache2-mod-wsgi", "binary_version": "4.5.17-1ubuntu1.1" }, { "binary_name": "libapache2-mod-wsgi-py3", "binary_version": "4.5.17-1ubuntu1.1" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "libapache2-mod-wsgi", "binary_version": "4.6.8-1ubuntu3.1" }, { "binary_name": "libapache2-mod-wsgi-py3", "binary_version": "4.6.8-1ubuntu3.1" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_name": "libapache2-mod-wsgi-py3", "binary_version": "4.9.0-1ubuntu0.1" } ], "availability": "No subscription required" }