Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-*
headers to the origin server based on client side Connection header
hop-by-hop mechanism. This may be used to bypass IP based authentication on
the origin server/application.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | apache2 | <Â 2.4.29-1ubuntu4.24 | UNKNOWN |
ubuntu | 20.04 | noarch | apache2 | <Â 2.4.41-4ubuntu3.12 | UNKNOWN |
ubuntu | 21.10 | noarch | apache2 | <Â 2.4.48-3.1ubuntu3.5 | UNKNOWN |
ubuntu | 22.04 | noarch | apache2 | <Â 2.4.52-1ubuntu4.1 | UNKNOWN |
ubuntu | 22.10 | noarch | apache2 | <Â 2.4.54-2ubuntu1 | UNKNOWN |
ubuntu | 14.04 | noarch | apache2 | <Â 2.4.7-1ubuntu4.22+esm8) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 16.04 | noarch | apache2 | <Â 2.4.18-2ubuntu3.17+esm6) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
github.com/apache/httpd/pull/320
httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-31813
launchpad.net/bugs/cve/CVE-2022-31813
nvd.nist.gov/vuln/detail/CVE-2022-31813
security-tracker.debian.org/tracker/CVE-2022-31813
ubuntu.com/security/notices/USN-5487-1
ubuntu.com/security/notices/USN-5487-2
ubuntu.com/security/notices/USN-5487-3
www.cve.org/CVERecord?id=CVE-2022-31813
www.openwall.com/lists/oss-security/2022/06/08/8