CVE-2022-31813
09.06.2022, 17:15
Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.Enginsight
Vendor | Product | Version |
---|---|---|
apache | http_server | 𝑥 < 2.4.54 |
netapp | clustered_data_ontap | - |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
apache2 |
|
Common Weakness Enumeration
- CWE-348 - Use of Less Trusted SourceThe software has two different sources of the same data or information, but it uses the source that has less support for verification, is less trusted, or is less resistant to attack.
- CWE-345 - Insufficient Verification of Data AuthenticityThe software does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
References