In scrapy version 2.10.1, an issue was identified where the Authorization header, containing credentials for server authentication, is leaked to a third-party site during a cross-domain redirect. This vulnerability arises from the failure to remove the Authorization header when redirecting across domains. The exposure of the Authorization header to unauthorized actors could potentially allow for account hijacking.
References
Link | Resource |
---|---|
https://github.com/scrapy/scrapy/commit/5bcb8fd5019c72d05c4a96da78a7fcb6ecb55b75 | Patch |
https://huntr.com/bounties/49974321-2718-43e3-a152-62b16eed72a9 | Exploit Third Party Advisory Issue Tracking Patch |
https://github.com/scrapy/scrapy/commit/5bcb8fd5019c72d05c4a96da78a7fcb6ecb55b75 | Patch |
https://huntr.com/bounties/49974321-2718-43e3-a152-62b16eed72a9 | Exploit Third Party Advisory Issue Tracking Patch |
Configurations
History
28 Jul 2025, 14:51
Type | Values Removed | Values Added |
---|---|---|
First Time |
Scrapy
Scrapy scrapy |
|
CPE | cpe:2.3:a:scrapy:scrapy:*:*:*:*:*:*:*:* | |
References | () https://github.com/scrapy/scrapy/commit/5bcb8fd5019c72d05c4a96da78a7fcb6ecb55b75 - Patch | |
References | () https://huntr.com/bounties/49974321-2718-43e3-a152-62b16eed72a9 - Exploit, Third Party Advisory, Issue Tracking, Patch |
21 Nov 2024, 09:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/scrapy/scrapy/commit/5bcb8fd5019c72d05c4a96da78a7fcb6ecb55b75 - | |
References | () https://huntr.com/bounties/49974321-2718-43e3-a152-62b16eed72a9 - |
16 Apr 2024, 13:24
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
16 Apr 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-16 00:15
Updated : 2025-07-28 14:51
NVD link : CVE-2024-3574
Mitre link : CVE-2024-3574
CVE.ORG link : CVE-2024-3574
JSON object : View
Products Affected
scrapy
- scrapy
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor