logo

CVE-2025-23217 mitmproxy

Package

Manager: pip
Name: mitmproxy
Vulnerable Version: >=0 <11.1.2

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00694 pctl0.70982

Details

Mitmweb API Authentication Bypass Using Proxy Server ### Impact In mitmweb 11.1.0 and below, a malicious client can use mitmweb's proxy server (bound to `*:8080` by default) to access mitmweb's internal API (bound to `127.0.0.1:8081` by default). In other words, while the client cannot access the API directly (good), they can access the API through the proxy (bad). An attacker may be able to escalate this [SSRF](https://en.wikipedia.org/wiki/Server-side_request_forgery)-style access to remote code execution. The mitmproxy and mitmdump tools are unaffected. Only mitmweb is affected. The `block_global` option, which is enabled by default, blocks connections originating from publicly-routable IP addresses in the proxy. The attacker needs to be in the same local network. ### Patches The vulnerability has been fixed in mitmproxy 11.1.2 and above. ### Acknowledgements We thank Stefan Grönke (@gronke) for reporting this vulnerability as part of a security audit by [Radically Open Security](https://www.radicallyopensecurity.com/). This audit was supported by the [NGI0 Entrust fund](https://nlnet.nl/entrust/) established by [NLnet](https://nlnet.nl/). ### Timeline - **2025-01-14**: Received initial report. - **2025-01-14**: Verified report and confirmed receipt. - **2025-01-19**: Shared patch with researcher. - **2025-02-04**: Received final confirmation that patch is working. - **2025-02-05**: Published patched release and advisory.

Metadata

Created: 2025-02-06T17:07:41Z
Modified: 2025-02-06T19:54:56Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/02/GHSA-wg33-5h85-7q5p/GHSA-wg33-5h85-7q5p.json
CWE IDs: ["CWE-288", "CWE-441"]
Alternative ID: GHSA-wg33-5h85-7q5p
Finding: F115
Auto approve: 1