Lucene search

K
cve[email protected]CVE-2021-41125
HistoryOct 06, 2021 - 6:15 p.m.

CVE-2021-41125

2021-10-0618:15:10
CWE-522
CWE-200
web.nvd.nist.gov
56
scrapy
python
http authentication
vulnerability
upgrade
credentials exposure
web crawling
web scraping
cve-2021-41125

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.4 Medium

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

72.7%

Scrapy is a high-level web crawling and scraping framework for Python. If you use HttpAuthMiddleware (i.e. the http_user and http_pass spider attributes) for HTTP authentication, all requests will expose your credentials to the request target. This includes requests generated by Scrapy components, such as robots.txt requests sent by Scrapy when the ROBOTSTXT_OBEY setting is set to True, or as requests reached through redirects. Upgrade to Scrapy 2.5.1 and use the new http_auth_domain spider attribute to control which domains are allowed to receive the configured HTTP authentication credentials. If you are using Scrapy 1.8 or a lower version, and upgrading to Scrapy 2.5.1 is not an option, you may upgrade to Scrapy 1.8.1 instead. If you cannot upgrade, set your HTTP authentication credentials on a per-request basis, using for example the w3lib.http.basic_auth_header function to convert your credentials into a value that you can assign to the Authorization header of your request, instead of defining your credentials globally using HttpAuthMiddleware.

Affected configurations

Vulners
NVD
Node
scrapyscrapyRange<1.8.1
OR
scrapyscrapyRange2.0.02.5.1
VendorProductVersionCPE
scrapyscrapy*cpe:2.3:a:scrapy:scrapy:*:*:*:*:*:*:*:*
scrapyscrapy*cpe:2.3:a:scrapy:scrapy:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "scrapy",
    "vendor": "scrapy",
    "versions": [
      {
        "status": "affected",
        "version": "< 1.8.1"
      },
      {
        "status": "affected",
        "version": ">= 2.0.0, < 2.5.1"
      }
    ]
  }
]

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.4 Medium

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

72.7%