Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-auya-u2uf-27gn
Summary
Duplicate Advisory: Scrapy decompression bomb vulnerability
## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-7j7m-v7m3-jqm7. This link is maintained to preserve external references.

## Original Description
The scrapy/scrapy project is vulnerable to XML External Entity (XXE) attacks due to the use of lxml.etree.fromstring for parsing untrusted XML data without proper validation. This vulnerability allows attackers to perform denial of service attacks, access local files, generate network connections, or circumvent firewalls by submitting specially crafted XML data.
Aliases
0
alias GHSA-rmqv-7v3j-mr7p
Fixed_packages
0
url pkg:pypi/scrapy@2.11.1
purl pkg:pypi/scrapy@2.11.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1k4b-pr5k-s7e5
1
vulnerability VCID-dc1m-rt7j-w3af
2
vulnerability VCID-nekz-z7zw-mfgz
3
vulnerability VCID-t5cn-a543-nyag
4
vulnerability VCID-urb1-hv1z-duga
5
vulnerability VCID-veaw-n6vt-zfgu
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/scrapy@2.11.1
Affected_packages
References
0
reference_url https://github.com/scrapy/scrapy
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/scrapy/scrapy
1
reference_url https://github.com/scrapy/scrapy/commit/809bfac4890f75fc73607318a04d2ccba71b3d9f
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/scrapy/scrapy/commit/809bfac4890f75fc73607318a04d2ccba71b3d9f
2
reference_url https://huntr.com/bounties/c4a0fac9-0c5a-4718-9ee4-2d06d58adabb
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://huntr.com/bounties/c4a0fac9-0c5a-4718-9ee4-2d06d58adabb
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2024-3572
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2024-3572
4
reference_url https://github.com/advisories/GHSA-rmqv-7v3j-mr7p
reference_id GHSA-rmqv-7v3j-mr7p
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-rmqv-7v3j-mr7p
Weaknesses
0
cwe_id 409
name Improper Handling of Highly Compressed Data (Data Amplification)
description The product does not handle or incorrectly handles a compressed input with a very high compression ratio that produces a large output.
1
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
2
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
Exploits
Severity_range_score7.0 - 8.9
Exploitabilitynull
Weighted_severitynull
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-auya-u2uf-27gn