CVE-2018-14505: Mitmweb in mitmproxy allows DNS Rebinding attacks
8.8
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.55936%
CWE
Published
7/31/2018
Updated
10/1/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
mitmproxy | pip | < 4.0.4 | 4.0.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from improper host validation in mitmweb's web server setup. The pre-patch version in app.py's Application class registered handlers without host restrictions, enabling access via any domain name. The fix added DNS rebinding protection by: 1) Introducing a DnsRebind handler that blocks non-IP access, and 2) Restricting handler registration to only match IP/localhost patterns via regex. The Application.init function's original handler configuration was the root cause as it didn't validate request origins, making CWE-20 (Input Validation) applicable.