Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS04MjNmLWN3bTktNGc3NM0WLA
Splash authentication credentials potentially leaked to target websites
Impact
If you use HttpAuthMiddleware
(i.e. the http_user
and http_pass
spider attributes) for Splash authentication, any non-Splash request will expose your credentials to the request target. This includes robots.txt
requests sent by Scrapy when the ROBOTSTXT_OBEY
setting is set to True
.
Patches
Upgrade to scrapy-splash 0.8.0 and use the new SPLASH_USER
and SPLASH_PASS
settings instead to set your Splash authentication credentials safely.
Workarounds
If you cannot upgrade, set your Splash request credentials on a per-request basis, using the splash_headers
request parameter, instead of defining them globally using the HttpAuthMiddleware
.
Alternatively, make sure all your requests go through Splash. That includes disabling the robots.txt middleware.
For more information
If you have any questions or comments about this advisory:
Permalink: https://github.com/advisories/GHSA-823f-cwm9-4g74JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS04MjNmLWN3bTktNGc3NM0WLA
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 2 years ago
Updated: over 1 year ago
CVSS Score: 7.4
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
Identifiers: GHSA-823f-cwm9-4g74, CVE-2021-41124
References:
- https://github.com/scrapy-plugins/scrapy-splash/security/advisories/GHSA-823f-cwm9-4g74
- https://nvd.nist.gov/vuln/detail/CVE-2021-41124
- https://github.com/scrapy-plugins/scrapy-splash/commit/2b253e57fe64ec575079c8cdc99fe2013502ea31
- https://github.com/scrapy-plugins/scrapy-splash/releases/tag/0.8.0
- https://github.com/advisories/GHSA-823f-cwm9-4g74
Blast Radius: 19.5
Affected Packages
pypi:scrapy-splash
Dependent packages: 5Dependent repositories: 429
Downloads: 173,646 last month
Affected Version Ranges: < 0.8.0
Fixed in: 0.8.0
All affected versions: 0.6.1, 0.7.1, 0.7.2
All unaffected versions: 0.8.0, 0.9.0