GHSA-jm3v-qxmh-hxwv: Scrapy's redirects ignoring scheme-specific proxy settings
4.3
CVSS Score
3.1
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
-
Published
5/14/2024
Updated
5/14/2024
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
Scrapy | pip | < 2.11.2 | 2.11.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The core vulnerability stems from improper origin comparison in redirect handling. The commit diff shows _build_redirect_request was modified to add scheme/port awareness, replacing simple netloc comparison. Since this function is used by RedirectMiddleware to create redirected requests, both the helper function and the middleware's response processing are implicated. The tests demonstrate scenarios where scheme changes should drop certain headers/proxy associations, confirming the redirect handling chain is the vulnerable component.