Nixpkgs security tracker

Login with GitHub

Details of issue NIXPKGS-2026-1196

NIXPKGS-2026-1196
published on
Permalink CVE-2026-40606
4.8 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 1 week ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    13 packages
    • mitmproxy2swagger
    • python312Packages.mitmproxy
    • python313Packages.mitmproxy
    • python314Packages.mitmproxy
    • python312Packages.mitmproxy-rs
    • python313Packages.mitmproxy-rs
    • python314Packages.mitmproxy-rs
    • python312Packages.mitmproxy-linux
    • python312Packages.mitmproxy-macos
    • python313Packages.mitmproxy-linux
    • python313Packages.mitmproxy-macos
    • python314Packages.mitmproxy-linux
    • python314Packages.mitmproxy-macos
  • @LeSuisse ignored maintainer @SuperSandro2000 maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
ProxyAuth Addon LDAP Injection in mitmproxy

mitmproxy is a interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers and mitmweb is a web-based interface for mitmproxy. In mitmproxy 12.2.1 and below, the builtin LDAP proxy authentication does not correctly sanitize the username when querying the LDAP server. This allows a malicious client to bypass authentication. Only mitmproxy instances using the proxyauth option with LDAP are affected. This option is not enabled by default. The vulnerability has been fixed in mitmproxy 12.2.2 and above.

Affected products

mitmproxy
  • ==< 12.2.2

Matching in nixpkgs

Ignored packages (13)

Package maintainers

Ignored maintainers (1)