An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS04MjNmLWN3bTktNGc3NM0WLA

Splash authentication credentials potentially leaked to target websites


If you use HttpAuthMiddleware (i.e. the http_user and http_pass spider attributes) for Splash authentication, any non-Splash request will expose your credentials to the request target. This includes robots.txt requests sent by Scrapy when the ROBOTSTXT_OBEY setting is set to True.


Upgrade to scrapy-splash 0.8.0 and use the new SPLASH_USER and SPLASH_PASS settings instead to set your Splash authentication credentials safely.


If you cannot upgrade, set your Splash request credentials on a per-request basis, using the splash_headers request parameter, instead of defining them globally using the HttpAuthMiddleware.

Alternatively, make sure all your requests go through Splash. That includes disabling the robots.txt middleware.

For more information

If you have any questions or comments about this advisory:

Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 2 years ago
Updated: about 1 year ago

CVSS Score: 7.4
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N

Identifiers: GHSA-823f-cwm9-4g74, CVE-2021-41124
References: Repository:
Blast Radius: 19.5

Affected Packages

Dependent packages: 5
Dependent repositories: 429
Downloads: 425,433 last month
Affected Version Ranges: < 0.8.0
Fixed in: 0.8.0
All affected versions: 0.6.1, 0.7.1, 0.7.2
All unaffected versions: 0.8.0, 0.9.0