-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| mitmproxy | pip | < 11.1.2 | 11.1.2 |
The vulnerability stemmed from: 1) API handlers lacking authentication inheritance chain (AuthRequestHandler adds token checks) 2) WebSocket handlers missing auth integration 3) Proxy server (*:8080) being able to route to internal API endpoints (127.0.0.1:8081). The commit diff shows critical security changes: introduction of AuthRequestHandler middleware, token validation in _require_auth wrapper, and handler list restructuring. Pre-patch versions of these components allowed proxy-mediated API access without authentication checks, enabling SSRF-style attacks.
A Semantic Attack on Google Gemini - Read the Latest Research