GHSA-4q82-j5c2-g2c5: Duplicate Advisory: Scrapy authorization header leakage on cross-domain redirect
7.5
CVSS Score
3.0
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
4/16/2024
Updated
4/16/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| scrapy | pip | < 2.11.1 | 2.11.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the redirect handling logic in _build_redirect_request function. The commit diff shows this function was modified to add Authorization header removal when domains differ. Before the patch, it only removed Cookie headers during cross-domain redirects but didn't check Authorization headers. The added test_cross_domain_header_dropping in test_downloadermiddleware_redirect.py confirms this was the vulnerable path. The function's responsibility to sanitize headers during redirect creation makes it the clear vulnerability source.