Bug 2281623 (CVE-2024-1968) - CVE-2024-1968 python-scrapy: sensitive information disclosure
Summary: CVE-2024-1968 python-scrapy: sensitive information disclosure
Keywords:
Status: NEW
Alias: CVE-2024-1968
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2281624
Blocks:
TreeView+ depends on / blocked
 
Reported: 2024-05-20 10:05 UTC by ybuenos
Modified: 2024-05-20 10:05 UTC (History)
0 users

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description ybuenos 2024-05-20 10:05:07 UTC
In scrapy/scrapy, an issue was identified where the Authorization header is not removed during redirects that only change the scheme (e.g., HTTPS to HTTP) but remain within the same domain. This behavior contravenes the Fetch standard, which mandates the removal of Authorization headers in cross-origin requests when the scheme, host, or port changes. Consequently, when a redirect downgrades from HTTPS to HTTP, the Authorization header may be inadvertently exposed in plaintext, leading to potential sensitive information disclosure to unauthorized actors. The flaw is located in the _build_redirect_request function of the redirect middleware.

https://github.com/scrapy/scrapy/commit/1d0502f25bbe55a22899af915623fda1aaeb9dd8
https://huntr.com/bounties/27f6a021-a891-446a-ada5-0226d619dd1a

Comment 1 ybuenos 2024-05-20 10:05:22 UTC
Created python-scrapy tracking bugs for this issue:

Affects: fedora-all [bug 2281624]


Note You need to log in before you can comment on or make changes to this bug.