Information Exposure Affecting python-scrapy package, versions *


Severity

Recommended
medium

Based on Ubuntu security rating.

Threat Intelligence

EPSS
0.19% (42nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UBUNTU2204-PYTHONSCRAPY-6672160
  • published18 Apr 2025
  • disclosed16 Apr 2024

Introduced: 16 Apr 2024

CVE-2024-3574  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

There is no fixed version for Ubuntu:22.04 python-scrapy.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python-scrapy package and not the python-scrapy package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

In scrapy version 2.10.1, an issue was identified where the Authorization header, containing credentials for server authentication, is leaked to a third-party site during a cross-domain redirect. This vulnerability arises from the failure to remove the Authorization header when redirecting across domains. The exposure of the Authorization header to unauthorized actors could potentially allow for account hijacking.