DEBIAN-CVE-2026-40606

Source
https://security-tracker.debian.org/tracker/CVE-2026-40606
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-40606.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2026-40606
Upstream
  • CVE-2026-40606
Published
2026-04-21T23:03:41.188198Z
Modified
2026-04-22T04:06:32.141773Z
Summary
[none]
Details

mitmproxy is a interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers and mitmweb is a web-based interface for mitmproxy. In mitmproxy 12.2.1 and below, the builtin LDAP proxy authentication does not correctly sanitize the username when querying the LDAP server. This allows a malicious client to bypass authentication. Only mitmproxy instances using the proxyauth option with LDAP are affected. This option is not enabled by default. The vulnerability has been fixed in mitmproxy 12.2.2 and above.

References

Affected packages

Debian:11 / mitmproxy

Package

Name
mitmproxy
Purl
pkg:deb/debian/mitmproxy?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*
6.0.2-1
6.0.2-2
8.*
8.1.1-1
8.1.1-2
8.1.1-3
8.1.1-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-40606.json"

Debian:12 / mitmproxy

Package

Name
mitmproxy
Purl
pkg:deb/debian/mitmproxy?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

8.*
8.1.1-2
8.1.1-3
8.1.1-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-40606.json"

Debian:14 / mitmproxy

Package

Name
mitmproxy
Purl
pkg:deb/debian/mitmproxy?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*
0.6-1
0.6-2
0.6-3
0.7-1
0.8-1
0.8-2
0.9.1-1
0.9.1-2
0.9.2-1
0.9.2-2
0.10-1
0.10-2
0.10.1-1
0.10.1-2
0.11.3-1
0.11.3-2
0.11.3-3
0.12.1-1
0.12.1-2
0.13-1
0.15-1
0.15-2
0.18.1-1
0.18.1-2
0.18.2-1
0.18.2-2
0.18.2-3
0.18.2-4
0.18.2-5
0.18.2-6
2.*
2.0.2-1
2.0.2-2
2.0.2-3
2.0.2-4
3.*
3.0.3-1
3.0.4-1
4.*
4.0.4-1
4.0.4-2
4.0.4-3
4.0.4-4
4.0.4-5
4.0.4-6
4.0.4-6.1
5.*
5.1.1-1
5.1.1-2
5.3.0-1
5.3.0-2
5.3.0-3
6.*
6.0.2-1
6.0.2-2
8.*
8.1.1-1
8.1.1-2
8.1.1-3
8.1.1-4

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-40606.json"