Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7j7m-v7m3-jqm7

Опубликовано: 16 фев. 2024
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Scrapy decompression bomb vulnerability

Impact

Scrapy limits allowed response sizes by default through the DOWNLOAD_MAXSIZE and DOWNLOAD_WARNSIZE settings.

However, those limits were only being enforced during the download of the raw, usually-compressed response bodies, and not during decompression, making Scrapy vulnerable to decompression bombs.

A malicious website being scraped could send a small response that, on decompression, could exhaust the memory available to the Scrapy process, potentially affecting any other process sharing that memory, and affecting disk usage in case of uncompressed response caching.

Patches

Upgrade to Scrapy 2.11.1.

If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.11.1 is not an option, you may upgrade to Scrapy 1.8.4 instead.

Workarounds

There is no easy workaround.

Disabling HTTP decompression altogether is impractical, as HTTP compression is a rather common practice.

However, it is technically possible to manually backport the 2.11.1 or 1.8.4 fix, replacing the corresponding components of an unpatched version of Scrapy with patched versions copied into your own code.

Acknowledgements

This security issue was reported by @dmandefy through huntr.com.

Пакеты

Наименование

scrapy

pip
Затронутые версииВерсия исправления

>= 2.0.0, < 2.11.1

2.11.1

Наименование

scrapy

pip
Затронутые версииВерсия исправления

< 1.8.4

1.8.4

EPSS

Процентиль: 37%
0.00157
Низкий

7.5 High

CVSS3

Дефекты

CWE-409

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 2 года назад

The scrapy/scrapy project is vulnerable to XML External Entity (XXE) attacks due to the use of lxml.etree.fromstring for parsing untrusted XML data without proper validation. This vulnerability allows attackers to perform denial of service attacks, access local files, generate network connections, or circumvent firewalls by submitting specially crafted XML data.

CVSS3: 7.5
nvd
почти 2 года назад

The scrapy/scrapy project is vulnerable to XML External Entity (XXE) attacks due to the use of lxml.etree.fromstring for parsing untrusted XML data without proper validation. This vulnerability allows attackers to perform denial of service attacks, access local files, generate network connections, or circumvent firewalls by submitting specially crafted XML data.

CVSS3: 7.5
debian
почти 2 года назад

The scrapy/scrapy project is vulnerable to XML External Entity (XXE) a ...

EPSS

Процентиль: 37%
0.00157
Низкий

7.5 High

CVSS3

Дефекты

CWE-409