A vulnerability was found in Scrapy up to 1.8.0/2.5.0 and classified as problematic. This issue affects the function w3lib.http.basic_auth_header
of the component HttpAuthMiddleware. Upgrading to version 1.8.1 or 2.5.1 eliminates this vulnerability. Applying the patch b01d69a1bf48060daec8f751368622352d8b85a6 is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.
Scrapy up to 1.8.0/2.5.0 HttpAuthMiddleware w3lib.http.basic_auth_header http_user/http_pass information disclosure
- Virtual Patching
- October 7, 2021
- 7:09 am
CVE-2024-22144 : ELI SCHEETZ ANTI-MALWARE SECURITY AND BRUTE-FORCE FIREWALL PLUGIN CODE INJECTION
Description Improper Control of Generation of Code (‘Code Injection’) vulnerability in Eli Scheetz Anti-Malware Security and Brute-Force Firewall gotmls allows
CVE-2024-26922 : LINUX KERNEL UP TO 6.9-RC4 AMDGPU PRIVILEGE ESCALATION
Description In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: validate the parameters of bo mapping operations more
CVE-2024-21511 : MYSQL2 UP TO 3.9.6 READCODEFOR TIMEZONE CODE INJECTION
Description Versions of the package mysql2 before 3.9.7 are vulnerable to Arbitrary Code Injection due to improper sanitization of the