Lookup for vulnerable packages by Package URL.

Purlpkg:pypi/scrapy@2.14.1
Typepypi
Namespace
Namescrapy
Version2.14.1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.14.2
Latest_non_vulnerable_version2.14.2
Affected_by_vulnerabilities
0
url VCID-1k4b-pr5k-s7e5
vulnerability_id VCID-1k4b-pr5k-s7e5
summary
Scrapy: Arbitrary Module Import via Referrer-Policy Header in RefererMiddleware
### Impact

Since version 1.4.0, Scrapy respects the `Referrer-Policy` response header to decide whether and how to set a `Referer` header on follow-up requests.

If the header value looked like a valid Python import path, Scrapy would import the referenced object and call it, assuming it referred to a referrer policy class (for example, `scrapy.spidermiddlewares.referer.DefaultReferrerPolicy`) and attempting to instantiate it to handle the `Referer` header.

A malicious site could exploit this by setting `Referrer-Policy` to a path such as `sys.exit`, causing Scrapy to import and execute it and potentially terminate the process.

### Patches

Upgrade to Scrapy 2.14.2 (or later).

### Workarounds

If you cannot upgrade to Scrapy 2.14.2, consider the following mitigations.

- **Disable the middleware:** If you don't need the `Referer` header on follow-up requests, set [`REFERER_ENABLED`](https://docs.scrapy.org/en/latest/topics/spider-middleware.html#referer-enabled) to `False`.
- **Set headers manually:** If you do need a `Referer`, disable the middleware and set the header explicitly on the requests that require it.
- **Set `referrer_policy` in request metadata:** If disabling the middleware is not viable, set the [`referrer_policy`](https://docs.scrapy.org/en/latest/topics/spider-middleware.html#referrer-policy) request meta key on all requests to prevent evaluating preceding responses' `Referrer-Policy`. For example:

```python
Request(
    url,
    meta={
        "referrer_policy": "scrapy.spidermiddlewares.referer.DefaultReferrerPolicy",
    },
)
```

Instead of editing requests individually, you can:

- implement a custom [spider middleware](https://docs.scrapy.org/en/latest/topics/spider-middleware.html) that runs before the built-in referrer policy middleware and sets the `referrer_policy` meta key; or
- set the meta key in start requests and use the [scrapy-sticky-meta-params](https://github.com/heylouiz/scrapy-sticky-meta-params) plugin to propagate it to follow-up requests.

If you want to continue respecting legitimate `Referrer-Policy` headers while protecting against malicious ones, disable the built-in referrer policy middleware by setting it to `None` in [`SPIDER_MIDDLEWARES`](https://docs.scrapy.org/en/latest/topics/settings.html#std-setting-SPIDER_MIDDLEWARES) and replace it with the fixed implementation from Scrapy 2.14.2.

If the Scrapy 2.14.2 implementation is incompatible with your project (for example, because your Scrapy version is older), copy the corresponding middleware from your Scrapy version, apply the same patch, and use that as a replacement.
references
0
reference_url https://github.com/scrapy/scrapy
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/scrapy/scrapy
1
reference_url https://github.com/scrapy/scrapy/commit/945b787a263586cb5803c01c6da57daad8997ae5
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/scrapy/scrapy/commit/945b787a263586cb5803c01c6da57daad8997ae5
2
reference_url https://github.com/scrapy/scrapy/security/advisories/GHSA-cwxj-rr6w-m6w7
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/scrapy/scrapy/security/advisories/GHSA-cwxj-rr6w-m6w7
3
reference_url https://github.com/advisories/GHSA-cwxj-rr6w-m6w7
reference_id GHSA-cwxj-rr6w-m6w7
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-cwxj-rr6w-m6w7
fixed_packages
0
url pkg:pypi/scrapy@2.14.2
purl pkg:pypi/scrapy@2.14.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/scrapy@2.14.2
aliases GHSA-cwxj-rr6w-m6w7
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1k4b-pr5k-s7e5
1
url VCID-m9gg-8qum-9bh2
vulnerability_id VCID-m9gg-8qum-9bh2
summary Scrapy 1.4 allows remote attackers to cause a denial of service (memory consumption) via large files because arbitrarily many files are read into memory, which is especially problematic if the files are then individually written in a separate thread to a slow storage resource, as demonstrated by interaction between dataReceived (in core/downloader/handlers/http11.py) and S3FilesStore.
references
0
reference_url http://blog.csdn.net/wangtua/article/details/75228728
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://blog.csdn.net/wangtua/article/details/75228728
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-14158
reference_id
reference_type
scores
0
value 0.00505
scoring_system epss
scoring_elements 0.66235
published_at 2026-04-18T12:55:00Z
1
value 0.00505
scoring_system epss
scoring_elements 0.66111
published_at 2026-04-01T12:55:00Z
2
value 0.00505
scoring_system epss
scoring_elements 0.66153
published_at 2026-04-02T12:55:00Z
3
value 0.00505
scoring_system epss
scoring_elements 0.66179
published_at 2026-04-04T12:55:00Z
4
value 0.00505
scoring_system epss
scoring_elements 0.66149
published_at 2026-04-07T12:55:00Z
5
value 0.00505
scoring_system epss
scoring_elements 0.66197
published_at 2026-04-08T12:55:00Z
6
value 0.00505
scoring_system epss
scoring_elements 0.6621
published_at 2026-04-09T12:55:00Z
7
value 0.00505
scoring_system epss
scoring_elements 0.66229
published_at 2026-04-11T12:55:00Z
8
value 0.00505
scoring_system epss
scoring_elements 0.66216
published_at 2026-04-12T12:55:00Z
9
value 0.00505
scoring_system epss
scoring_elements 0.66185
published_at 2026-04-13T12:55:00Z
10
value 0.00505
scoring_system epss
scoring_elements 0.66221
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-14158
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14158
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14158
3
reference_url https://github.com/advisories/GHSA-h7wm-ph43-c39p
reference_id
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-h7wm-ph43-c39p
4
reference_url https://github.com/pypa/advisory-database/blob/8b7a4d62a95e8f605e5dfb4e0b4f299e6403dc12/vulns/scrapy/PYSEC-2017-83.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/blob/8b7a4d62a95e8f605e5dfb4e0b4f299e6403dc12/vulns/scrapy/PYSEC-2017-83.yaml
5
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/scrapy/PYSEC-2017-83.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/scrapy/PYSEC-2017-83.yaml
6
reference_url https://github.com/scrapy/scrapy
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/scrapy/scrapy
7
reference_url https://github.com/scrapy/scrapy/issues/482
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/scrapy/scrapy/issues/482
8
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875947
reference_id 875947
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=875947
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-14158
reference_id CVE-2017-14158
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-14158
fixed_packages
aliases CVE-2017-14158, GHSA-h7wm-ph43-c39p, PYSEC-2017-83
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m9gg-8qum-9bh2
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:pypi/scrapy@2.14.1