Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS04MjNmLWN3bTktNGc3NM0WLA

Splash authentication credentials potentially leaked to target websites

Impact

If you use HttpAuthMiddleware (i.e. the http_user and http_pass spider attributes) for Splash authentication, any non-Splash request will expose your credentials to the request target. This includes robots.txt requests sent by Scrapy when the ROBOTSTXT_OBEY setting is set to True.

Patches

Upgrade to scrapy-splash 0.8.0 and use the new SPLASH_USER and SPLASH_PASS settings instead to set your Splash authentication credentials safely.

Workarounds

If you cannot upgrade, set your Splash request credentials on a per-request basis, using the splash_headers request parameter, instead of defining them globally using the HttpAuthMiddleware.

Alternatively, make sure all your requests go through Splash. That includes disabling the robots.txt middleware.

For more information

If you have any questions or comments about this advisory:

Permalink: https://github.com/advisories/GHSA-823f-cwm9-4g74
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS04MjNmLWN3bTktNGc3NM0WLA
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 2 years ago
Updated: over 1 year ago


CVSS Score: 7.4
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N

Identifiers: GHSA-823f-cwm9-4g74, CVE-2021-41124
References: Repository: https://github.com/scrapy-plugins/scrapy-splash
Blast Radius: 19.5

Affected Packages

pypi:scrapy-splash
Dependent packages: 5
Dependent repositories: 429
Downloads: 173,646 last month
Affected Version Ranges: < 0.8.0
Fixed in: 0.8.0
All affected versions: 0.6.1, 0.7.1, 0.7.2
All unaffected versions: 0.8.0, 0.9.0