漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Insufficient Protection against HTTP Request Smuggling in mitmproxy
Vulnerability Description
mitmproxy is an interactive, SSL/TLS-capable intercepting proxy. In mitmproxy 7.0.4 and below, a malicious client or server is able to perform HTTP request smuggling attacks through mitmproxy. This means that a malicious client/server could smuggle a request/response through mitmproxy as part of another request/response's HTTP message body. While mitmproxy would only see one request, the target server would see multiple requests. A smuggled request is still captured as part of another request's body, but it does not appear in the request list and does not go through the usual mitmproxy event hooks, where users may have implemented custom access control checks or input sanitization. Unless mitmproxy is used to protect an HTTP/1 service, no action is required. The vulnerability has been fixed in mitmproxy 8.0.0 and above. There are currently no known workarounds.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vulnerability Type
HTTP请求的解释不一致性(HTTP请求私运)
Vulnerability Title
mitmproxy 环境问题漏洞
Vulnerability Description
mitmproxy是一个交互式的、支持 SSL/TLS 的拦截代理,带有用于 HTTP/1、HTTP/2 和 WebSockets 的控制台界面。 mitmproxy 7.0.4 版本及之前版本存在安全漏洞,该漏洞源于恶意客户端或服务器能够通过 mitmproxy 执行请求夹带(request smuggling)攻击。
CVSS Information
N/A
Vulnerability Type
N/A