Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-3574

Опубликовано: 16 апр. 2024
Источник: debian

Описание

In scrapy version 2.10.1, an issue was identified where the Authorization header, containing credentials for server authentication, is leaked to a third-party site during a cross-domain redirect. This vulnerability arises from the failure to remove the Authorization header when redirecting across domains. The exposure of the Authorization header to unauthorized actors could potentially allow for account hijacking.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python-scrapyfixed2.11.1-1package
python-scrapyno-dsabookwormpackage
python-scrapyno-dsabullseyepackage
python-scrapypostponedbusterpackage

Примечания

  • https://github.com/scrapy/scrapy/security/advisories/GHSA-cw9j-q3vf-hrrv

  • https://huntr.com/bounties/49974321-2718-43e3-a152-62b16eed72a9

  • https://github.com/scrapy/scrapy/commit/5bcb8fd5019c72d05c4a96da78a7fcb6ecb55b75 (2.11.1)

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 2 года назад

In scrapy version 2.10.1, an issue was identified where the Authorization header, containing credentials for server authentication, is leaked to a third-party site during a cross-domain redirect. This vulnerability arises from the failure to remove the Authorization header when redirecting across domains. The exposure of the Authorization header to unauthorized actors could potentially allow for account hijacking.

CVSS3: 7.5
nvd
почти 2 года назад

In scrapy version 2.10.1, an issue was identified where the Authorization header, containing credentials for server authentication, is leaked to a third-party site during a cross-domain redirect. This vulnerability arises from the failure to remove the Authorization header when redirecting across domains. The exposure of the Authorization header to unauthorized actors could potentially allow for account hijacking.

CVSS3: 7.5
github
почти 2 года назад

Scrapy authorization header leakage on cross-domain redirect