漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Mitmweb API Authentication Bypass Using Proxy Server
Vulnerability Description
mitmproxy is a interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers and mitmweb is a web-based interface for mitmproxy. In mitmweb 11.1.1 and below, a malicious client can use mitmweb's proxy server (bound to `*:8080` by default) to access mitmweb's internal API (bound to `127.0.0.1:8081` by default). In other words, while the cannot access the API directly, they can access the API through the proxy. An attacker may be able to escalate this SSRF-style access to remote code execution. The mitmproxy and mitmdump tools are unaffected. Only mitmweb is affected. This vulnerability has been fixed in mitmproxy 11.1.2 and above. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVSS Information
N/A
Vulnerability Type
使用候选路径或通道进行的认证绕过
Vulnerability Title
mitmproxy 安全漏洞
Vulnerability Description
mitmproxy是mitmproxy开源的一个交互式的、支持 SSL/TLS 的拦截代理,带有用于 HTTP/1、HTTP/2 和 WebSockets 的控制台界面。 mitmproxy 11.1.1及之前版本存在安全漏洞,该漏洞源于恶意客户端可以利用代理服务器访问其内部API,可能导致远程代码执行。
CVSS Information
N/A
Vulnerability Type
N/A