GHSA-wg33-5h85-7q5p

Suggest an improvement
Source
https://github.com/advisories/GHSA-wg33-5h85-7q5p
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/02/GHSA-wg33-5h85-7q5p/GHSA-wg33-5h85-7q5p.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-wg33-5h85-7q5p
Aliases
Published
2025-02-06T17:07:41Z
Modified
2025-02-06T20:13:22.112703Z
Severity
  • 8.2 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
Mitmweb API Authentication Bypass Using Proxy Server
Details

Impact

In mitmweb 11.1.0 and below, a malicious client can use mitmweb's proxy server (bound to *:8080 by default) to access mitmweb's internal API (bound to 127.0.0.1:8081 by default). In other words, while the client cannot access the API directly (good), they can access the API through the proxy (bad). An attacker may be able to escalate this SSRF-style access to remote code execution.

The mitmproxy and mitmdump tools are unaffected. Only mitmweb is affected. The block_global option, which is enabled by default, blocks connections originating from publicly-routable IP addresses in the proxy. The attacker needs to be in the same local network.

Patches

The vulnerability has been fixed in mitmproxy 11.1.2 and above.

Acknowledgements

We thank Stefan Grönke (@gronke) for reporting this vulnerability as part of a security audit by Radically Open Security. This audit was supported by the NGI0 Entrust fund established by NLnet.

Timeline

  • 2025-01-14: Received initial report.
  • 2025-01-14: Verified report and confirmed receipt.
  • 2025-01-19: Shared patch with researcher.
  • 2025-02-04: Received final confirmation that patch is working.
  • 2025-02-05: Published patched release and advisory.
Database specific
{
    "nvd_published_at": "2025-02-06T18:15:32Z",
    "cwe_ids": [
        "CWE-288",
        "CWE-441"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2025-02-06T17:07:41Z"
}
References

Affected packages

PyPI / mitmproxy

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
11.1.2

Affected versions

0.*

0.8
0.8.1
0.9
0.9.1
0.9.2
0.10
0.10.1
0.11
0.11.1
0.11.2
0.11.3
0.12.0
0.12.1
0.13
0.14.0
0.15
0.16
0.17
0.18.1
0.18.2
0.18.3

1.*

1.0.0
1.0.1
1.0.2

2.*

2.0.0
2.0.1
2.0.2

3.*

3.0.0
3.0.1
3.0.2
3.0.3
3.0.4

4.*

4.0.0
4.0.1
4.0.3
4.0.4

5.*

5.0.0
5.0.1
5.1.0
5.1.1
5.2
5.3.0

6.*

6.0.0
6.0.1
6.0.2

7.*

7.0.0
7.0.1
7.0.2
7.0.3
7.0.4

8.*

8.0.0
8.1.0
8.1.1

9.*

9.0.0
9.0.1

10.*

10.0.0
10.1.0
10.1.1
10.1.2
10.1.3
10.1.4
10.1.5
10.1.6
10.2.0
10.2.1
10.2.2
10.2.3
10.2.4
10.3.0
10.3.1
10.4.0
10.4.1
10.4.2

11.*

11.0.0
11.0.1
11.0.2
11.1.0