Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-39214— Lacking Protection against HTTP Request Smuggling in mitmproxy

CVSS 8.1 · High EPSS 0.19% · P41
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-39214

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Lacking Protection against HTTP Request Smuggling in mitmproxy
Source: NVD (National Vulnerability Database)
Vulnerability Description
mitmproxy is an interactive, SSL/TLS-capable intercepting proxy. In mitmproxy 7.0.2 and below, a malicious client or server is able to perform HTTP request smuggling attacks through mitmproxy. This means that a malicious client/server could smuggle a request/response through mitmproxy as part of another request/response's HTTP message body. While a smuggled request is still captured as part of another request's body, it does not appear in the request list and does not go through the usual mitmproxy event hooks, where users may have implemented custom access control checks or input sanitization. Unless one uses mitmproxy to protect an HTTP/1 service, no action is required. The vulnerability has been fixed in mitmproxy 7.0.3 and above.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
HTTP请求的解释不一致性(HTTP请求私运)
Source: NVD (National Vulnerability Database)
Vulnerability Title
mitmproxy环境问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
mitmproxy是一个交互式的、支持 SSL/TLS 的拦截代理,带有用于 HTTP/1、HTTP/2 和 WebSockets 的控制台界面。 mitmproxy 7.0.2及之前版本存在环境问题漏洞,恶意客户端/服务器可以通过mitmproxy将请求/响应作为另一个请求/响应的HTTP消息体的一部分走私。该漏洞已在mitmproxy 7.0.3及更高版本中修复。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
mitmproxymitmproxy < 7.0.3 -

II. Public POCs for CVE-2021-39214

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-39214

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2021-39214

No comments yet


Leave a comment