CVE-2022-0577: Incorrect Authorization and Exposure of Sensitive Information to an Unauthorized Actor in scrapy
(updated )
If you manually define cookies on a Request
object, and that Request
object gets a redirect response, the new Request
object scheduled to follow the redirect keeps those user-defined cookies, regardless of the target domain.
References
- github.com/advisories/GHSA-cjvr-mfj7-j4j8
- github.com/pypa/advisory-database/tree/main/vulns/scrapy/PYSEC-2022-159.yaml
- github.com/scrapy/scrapy
- github.com/scrapy/scrapy/commit/8ce01b3b76d4634f55067d6cfdf632ec70ba304a
- github.com/scrapy/scrapy/security/advisories/GHSA-cjvr-mfj7-j4j8
- huntr.dev/bounties/3da527b1-2348-4f69-9e88-2e11a96ac585
- lists.debian.org/debian-lts-announce/2022/03/msg00021.html
- nvd.nist.gov/vuln/detail/CVE-2022-0577
Detect and mitigate CVE-2022-0577 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →