CVE-2024-1968

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-1968
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-1968.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-1968
Aliases
Related
Published
2024-05-20T08:15:08Z
Modified
2024-10-12T11:16:23.875604Z
Summary
[none]
Details

In scrapy/scrapy, an issue was identified where the Authorization header is not removed during redirects that only change the scheme (e.g., HTTPS to HTTP) but remain within the same domain. This behavior contravenes the Fetch standard, which mandates the removal of Authorization headers in cross-origin requests when the scheme, host, or port changes. Consequently, when a redirect downgrades from HTTPS to HTTP, the Authorization header may be inadvertently exposed in plaintext, leading to potential sensitive information disclosure to unauthorized actors. The flaw is located in the buildredirect_request function of the redirect middleware.

References

Affected packages

Debian:11 / python-scrapy

Package

Name
python-scrapy
Purl
pkg:deb/debian/python-scrapy?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.4.1-2
2.4.1-2+deb11u1
2.5.0-1~exp1
2.5.0-1
2.5.0-2
2.5.1-1
2.5.1-2
2.6.1-1
2.6.2-1
2.7.0-1
2.7.1-1
2.8.0-1
2.8.0-2
2.9.0-1~exp1
2.9.0-1
2.9.0-2
2.10.0-1
2.11.0-1
2.11.0-2
2.11.1-1
2.11.1-2
2.11.2-1
2.11.2-2
2.11.2-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / python-scrapy

Package

Name
python-scrapy
Purl
pkg:deb/debian/python-scrapy?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.8.0-2
2.9.0-1~exp1
2.9.0-1
2.9.0-2
2.10.0-1
2.11.0-1
2.11.0-2
2.11.1-1
2.11.1-2
2.11.2-1
2.11.2-2
2.11.2-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / python-scrapy

Package

Name
python-scrapy
Purl
pkg:deb/debian/python-scrapy?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.11.2-1

Affected versions

2.*

2.8.0-2
2.9.0-1~exp1
2.9.0-1
2.9.0-2
2.10.0-1
2.11.0-1
2.11.0-2
2.11.1-1
2.11.1-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/scrapy/scrapy

Affected ranges

Type
GIT
Repo
https://github.com/scrapy/scrapy
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.10
0.10-rc1
0.10.1
0.10.2
0.10.3
0.14.0
0.15.0
0.15.1
0.17.0
0.18.0
0.19.0
0.21.0
0.23.0
0.24.0
0.25.0
0.25.1
0.7
0.7-rc1
0.8
0.9
0.9-rc1

1.*

1.0.0rc1
1.2.0
1.2.0dev2
1.2.1
1.2.2
1.3.0
1.3.1
1.3.2
1.4.0
1.5.0
1.6.0
1.7.0
1.8.0

2.*

2.0.0
2.1.0
2.10.0
2.10.1
2.11.0
2.11.1
2.2.0
2.3.0
2.4.0
2.4.1
2.5.0
2.6.0
2.6.1
2.6.2
2.7.0
2.7.1
2.8.0
2.9.0

Other

hojo

scrapy-0.*

scrapy-0.25.1-sc