Headline
Ubuntu Security Notice USN-5551-1
Ubuntu Security Notice 5551-1 - It was discovered that mod-wsgi did not correctly remove the X-Client-IP header when processing requests from untrusted proxies. A remote attacker could use this issue to pass the header to WSGI applications, contrary to expectations.
==========================================================================
Ubuntu Security Notice USN-5551-1
August 04, 2022
mod-wsgi vulnerability
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
mod-wsgi could allow unintended access to network services.
Software Description:
- mod-wsgi: Python WSGI adapter module for Apache
Details:
It was discovered that mod-wsgi did not correctly remove the X-Client-IP
header when processing requests from untrusted proxies. A remote attacker
could use this issue to pass the header to WSGI applications, contrary
to expectations.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS:
libapache2-mod-wsgi-py3 4.9.0-1ubuntu0.1
Ubuntu 20.04 LTS:
libapache2-mod-wsgi 4.6.8-1ubuntu3.1
libapache2-mod-wsgi-py3 4.6.8-1ubuntu3.1
Ubuntu 18.04 LTS:
libapache2-mod-wsgi 4.5.17-1ubuntu1.1
libapache2-mod-wsgi-py3 4.5.17-1ubuntu1.1
After a standard system update you need to restart your web service to make
all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-5551-1
CVE-2022-2255
Package Information:
https://launchpad.net/ubuntu/+source/mod-wsgi/4.9.0-1ubuntu0.1
https://launchpad.net/ubuntu/+source/mod-wsgi/4.6.8-1ubuntu3.1
https://launchpad.net/ubuntu/+source/mod-wsgi/4.5.17-1ubuntu1.1
Related news
A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.
A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.