Information Exposure Affecting python-scrapy package, versions *


Severity

Recommended
medium

Based on Ubuntu security rating.

Threat Intelligence

EPSS
0.14% (36th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UBUNTU2204-PYTHONSCRAPY-6948234
  • published18 Apr 2025
  • disclosed20 May 2024

Introduced: 20 May 2024

CVE-2024-1968  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

There is no fixed version for Ubuntu:22.04 python-scrapy.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python-scrapy package and not the python-scrapy package as distributed by Ubuntu. See How to fix? for Ubuntu:22.04 relevant fixed versions and status.

In scrapy/scrapy, an issue was identified where the Authorization header is not removed during redirects that only change the scheme (e.g., HTTPS to HTTP) but remain within the same domain. This behavior contravenes the Fetch standard, which mandates the removal of Authorization headers in cross-origin requests when the scheme, host, or port changes. Consequently, when a redirect downgrades from HTTPS to HTTP, the Authorization header may be inadvertently exposed in plaintext, leading to potential sensitive information disclosure to unauthorized actors. The flaw is located in the _build_redirect_request function of the redirect middleware.