-
Notifications
You must be signed in to change notification settings - Fork 28
Description
CVE-2024-3574 - High Severity Vulnerability
Vulnerable Library - Scrapy-2.6.2-py2.py3-none-any.whl
A high-level Web Crawling and Web Scraping framework
Library home page: https://files.pythonhosted.org/packages/e2/8a/e3870cd597bbd4f47d7e1c97bbb67a6293270b9c413e083058ce6d6c7eb7/Scrapy-2.6.2-py2.py3-none-any.whl
Path to dependency file: /requirements.txt
Path to vulnerable library: /requirements.txt
Dependency Hierarchy:
- ❌ Scrapy-2.6.2-py2.py3-none-any.whl (Vulnerable Library)
Found in base branch: master
Vulnerability Details
In scrapy version 2.10.1, an issue was identified where the Authorization header, containing credentials for server authentication, is leaked to a third-party site during a cross-domain redirect. This vulnerability arises from the failure to remove the Authorization header when redirecting across domains. The exposure of the Authorization header to unauthorized actors could potentially allow for account hijacking.
Publish Date: 2024-04-16
URL: CVE-2024-3574
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2024-3574
Release Date: 2024-04-16
Fix Resolution: scrapy - 2.11.1
Step up your Open Source Security Game with Mend here