Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cw9j-q3vf-hrrv

Опубликовано: 15 фев. 2024
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Scrapy authorization header leakage on cross-domain redirect

Impact

When you send a request with the Authorization header to one domain, and the response asks to redirect to a different domain, Scrapy’s built-in redirect middleware creates a follow-up redirect request that keeps the original Authorization header, leaking its content to that second domain.

The right behavior would be to drop the Authorization header instead, in this scenario.

Patches

Upgrade to Scrapy 2.11.1.

If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.11.1 is not an option, you may upgrade to Scrapy 1.8.4 instead.

Workarounds

If you cannot upgrade, make sure that you are not using the Authentication header, either directly or through some third-party plugin.

If you need to use that header in some requests, add "dont_redirect": True to the request.meta dictionary of those requests to disable following redirects for them.

If you need to keep (same domain) redirect support on those requests, make sure you trust the target website not to redirect your requests to a different domain.

Acknowledgements

This security issue was reported by @ranjit-git through huntr.com.

Пакеты

Наименование

scrapy

pip
Затронутые версииВерсия исправления

>= 2, < 2.11.1

2.11.1

Наименование

scrapy

pip
Затронутые версииВерсия исправления

< 1.8.4

1.8.4

EPSS

Процентиль: 32%
0.00121
Низкий

7.5 High

CVSS3

Дефекты

CWE-200

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 2 года назад

In scrapy version 2.10.1, an issue was identified where the Authorization header, containing credentials for server authentication, is leaked to a third-party site during a cross-domain redirect. This vulnerability arises from the failure to remove the Authorization header when redirecting across domains. The exposure of the Authorization header to unauthorized actors could potentially allow for account hijacking.

CVSS3: 7.5
nvd
почти 2 года назад

In scrapy version 2.10.1, an issue was identified where the Authorization header, containing credentials for server authentication, is leaked to a third-party site during a cross-domain redirect. This vulnerability arises from the failure to remove the Authorization header when redirecting across domains. The exposure of the Authorization header to unauthorized actors could potentially allow for account hijacking.

CVSS3: 7.5
debian
почти 2 года назад

In scrapy version 2.10.1, an issue was identified where the Authorizat ...

EPSS

Процентиль: 32%
0.00121
Низкий

7.5 High

CVSS3

Дефекты

CWE-200