Debian Package Tracker
Register | Log in
Subscribe

mitmproxy

SSL-capable man-in-the-middle HTTP proxy

Choose email to subscribe with

general
  • source: mitmproxy (main)
  • version: 8.1.1-4
  • maintainer: Debian Python Team (DMD)
  • uploaders: Andrej Shadura [DMD]
  • arch: all
  • std-ver: 4.6.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 6.0.2-1
  • oldstable: 8.1.1-2
  • testing: 8.1.1-4
  • unstable: 8.1.1-4
versioned links
  • 6.0.2-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8.1.1-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 8.1.1-4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • mitmproxy (5 bugs: 0, 4, 1, 0)
action needed
A new upstream version is available: 12.2.2 high
A new upstream version 12.2.2 is available, you should consider packaging it.
Created: 2025-11-27 Last update: 2026-05-01 07:30
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2026-40606: mitmproxy is a interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers and mitmweb is a web-based interface for mitmproxy. In mitmproxy 12.2.1 and below, the builtin LDAP proxy authentication does not correctly sanitize the username when querying the LDAP server. This allows a malicious client to bypass authentication. Only mitmproxy instances using the proxyauth option with LDAP are affected. This option is not enabled by default. The vulnerability has been fixed in mitmproxy 12.2.2 and above.
Created: 2026-04-22 Last update: 2026-04-28 19:02
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2026-40606: mitmproxy is a interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers and mitmweb is a web-based interface for mitmproxy. In mitmproxy 12.2.1 and below, the builtin LDAP proxy authentication does not correctly sanitize the username when querying the LDAP server. This allows a malicious client to bypass authentication. Only mitmproxy instances using the proxyauth option with LDAP are affected. This option is not enabled by default. The vulnerability has been fixed in mitmproxy 12.2.2 and above.
Created: 2026-04-22 Last update: 2026-04-28 19:02
1 bug tagged patch in the BTS normal
The BTS contains patches fixing 1 bug, consider including or untagging them.
Created: 2026-04-06 Last update: 2026-05-01 08:00
lintian reports 4 warnings normal
Lintian reports 4 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2025-10-14 Last update: 2025-10-14 00:32
1 open merge request in Salsa normal
There is 1 open merge request for this package on Salsa. You should consider reviewing and/or merging these merge requests.
Created: 2025-08-19 Last update: 2025-08-19 06:28
2 low-priority security issues in bookworm low

There are 2 open security issues in bookworm.

2 issues left for the package maintainer to handle:
  • CVE-2025-23217: (needs triaging) mitmproxy is a interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers and mitmweb is a web-based interface for mitmproxy. In mitmweb 11.1.1 and below, a malicious client can use mitmweb's proxy server (bound to `*:8080` by default) to access mitmweb's internal API (bound to `127.0.0.1:8081` by default). In other words, while the cannot access the API directly, they can access the API through the proxy. An attacker may be able to escalate this SSRF-style access to remote code execution. The mitmproxy and mitmdump tools are unaffected. Only mitmweb is affected. This vulnerability has been fixed in mitmproxy 11.1.2 and above. Users are advised to upgrade. There are no known workarounds for this vulnerability.
  • CVE-2026-40606: (needs triaging) mitmproxy is a interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers and mitmweb is a web-based interface for mitmproxy. In mitmproxy 12.2.1 and below, the builtin LDAP proxy authentication does not correctly sanitize the username when querying the LDAP server. This allows a malicious client to bypass authentication. Only mitmproxy instances using the proxyauth option with LDAP are affected. This option is not enabled by default. The vulnerability has been fixed in mitmproxy 12.2.2 and above.

You can find information about how to handle these issues in the security team's documentation.

Created: 2025-02-07 Last update: 2026-04-28 19:02
debian/patches: 8 patches to forward upstream low

Among the 8 debian patches available in version 8.1.1-4 of the package, we noticed the following issues:

  • 8 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2025-10-13 20:34
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.6.2).
Created: 2024-04-07 Last update: 2026-03-31 15:01
news
[rss feed]
  • [2025-10-18] mitmproxy 8.1.1-4 MIGRATED to testing (Debian testing watch)
  • [2025-10-13] Accepted mitmproxy 8.1.1-4 (source) into unstable (Gianfranco Costamagna)
  • [2025-05-17] Accepted mitmproxy 8.1.1-3 (source) into unstable (Alexandre Detiste)
  • [2024-07-10] mitmproxy REMOVED from testing (Debian testing watch)
  • [2023-03-14] mitmproxy 8.1.1-2 MIGRATED to testing (Debian testing watch)
  • [2023-03-02] Accepted mitmproxy 8.1.1-2 (source) into unstable (Aron Xu)
  • [2023-02-08] mitmproxy 8.1.1-1 MIGRATED to testing (Debian testing watch)
  • [2023-02-05] Accepted mitmproxy 8.1.1-1 (source) into unstable (Bastian Germann) (signed by: bage@debian.org)
  • [2023-01-30] mitmproxy 6.0.2-2 MIGRATED to testing (Debian testing watch)
  • [2023-01-24] Accepted mitmproxy 6.0.2-2 (source) into unstable (Andrey Rakhmatullin) (signed by: Andrey Rahmatullin)
  • [2021-01-09] mitmproxy 6.0.2-1 MIGRATED to testing (Debian testing watch)
  • [2021-01-06] Accepted mitmproxy 6.0.2-1 (source) into unstable (Andrej Shadura) (signed by: Andrew Shadura)
  • [2021-01-04] Accepted mitmproxy 5.3.0-3 (source) into unstable (Andrej Shadura) (signed by: Andrew Shadura)
  • [2021-01-04] mitmproxy 5.3.0-2 MIGRATED to testing (Debian testing watch)
  • [2020-12-30] Accepted mitmproxy 5.3.0-2 (source) into unstable (Andrej Shadura) (signed by: Andrew Shadura)
  • [2020-12-06] mitmproxy 5.3.0-1 MIGRATED to testing (Debian testing watch)
  • [2020-11-30] Accepted mitmproxy 5.3.0-1 (source) into unstable (Andrej Shadura) (signed by: Andrew Shadura)
  • [2020-07-05] mitmproxy 5.1.1-2 MIGRATED to testing (Debian testing watch)
  • [2020-06-29] Accepted mitmproxy 5.1.1-2 (source) into unstable (Andrej Shadura) (signed by: Andrew Shadura)
  • [2020-06-19] Accepted mitmproxy 5.1.1-1 (source) into unstable (Andrej Shadura) (signed by: Andrew Shadura)
  • [2020-06-18] mitmproxy REMOVED from testing (Debian testing watch)
  • [2020-04-14] mitmproxy 4.0.4-6.1 MIGRATED to testing (Debian testing watch)
  • [2020-04-08] Accepted mitmproxy 4.0.4-6.1 (source) into unstable (Andrej Shadura) (signed by: Andrew Shadura)
  • [2020-02-19] mitmproxy REMOVED from testing (Debian testing watch)
  • [2019-08-30] Accepted mitmproxy 0.18.2-6+deb9u2 (source) into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates (Sebastien Delafond)
  • [2019-08-25] Accepted mitmproxy 0.18.2-6+deb9u1 (source) into oldstable-proposed-updates->oldstable-new, oldstable-proposed-updates (Sebastien Delafond)
  • [2019-07-09] mitmproxy 4.0.4-6 MIGRATED to testing (Debian testing watch)
  • [2019-05-23] Accepted mitmproxy 4.0.4-6 (source) into unstable (Sebastien Delafond)
  • [2019-04-02] mitmproxy 4.0.4-5 MIGRATED to testing (Debian testing watch)
  • [2019-03-04] Accepted mitmproxy 4.0.4-5 (source) into unstable (Sebastien Delafond)
  • 1
  • 2
bugs [bug history graph]
  • all: 7
  • RC: 0
  • I&N: 6
  • M&W: 1
  • F&P: 0
  • patch: 1
links
  • homepage
  • lintian (0, 4)
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • other distros
  • security tracker
  • screenshots
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 8.1.1-4
  • 2 bugs

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing