Security
Headlines
HeadlinesLatestCVEs

Headline

Ubuntu Security Notice USN-5551-1

Ubuntu Security Notice 5551-1 - It was discovered that mod-wsgi did not correctly remove the X-Client-IP header when processing requests from untrusted proxies. A remote attacker could use this issue to pass the header to WSGI applications, contrary to expectations.

Packet Storm
#vulnerability#web#ubuntu#apache

==========================================================================
Ubuntu Security Notice USN-5551-1
August 04, 2022

mod-wsgi vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 LTS

Summary:

mod-wsgi could allow unintended access to network services.

Software Description:

  • mod-wsgi: Python WSGI adapter module for Apache

Details:

It was discovered that mod-wsgi did not correctly remove the X-Client-IP
header when processing requests from untrusted proxies. A remote attacker
could use this issue to pass the header to WSGI applications, contrary
to expectations.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS:
libapache2-mod-wsgi-py3 4.9.0-1ubuntu0.1

Ubuntu 20.04 LTS:
libapache2-mod-wsgi 4.6.8-1ubuntu3.1
libapache2-mod-wsgi-py3 4.6.8-1ubuntu3.1

Ubuntu 18.04 LTS:
libapache2-mod-wsgi 4.5.17-1ubuntu1.1
libapache2-mod-wsgi-py3 4.5.17-1ubuntu1.1

After a standard system update you need to restart your web service to make
all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-5551-1
CVE-2022-2255

Package Information:
https://launchpad.net/ubuntu/+source/mod-wsgi/4.9.0-1ubuntu0.1
https://launchpad.net/ubuntu/+source/mod-wsgi/4.6.8-1ubuntu3.1
https://launchpad.net/ubuntu/+source/mod-wsgi/4.5.17-1ubuntu1.1

Related news

GHSA-7527-8855-9cf8: Incorrect header handling in mod-wsgi

A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.

CVE-2022-2255: mod_wsgi/mod_wsgi.c at 4.9.2 · GrahamDumpleton/mod_wsgi

A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.

Packet Storm: Latest News

CUPS IPP Attributes LAN Remote Code Execution