Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/python-scrapy@2.11.2-1?distro=trixie
purl pkg:deb/debian/python-scrapy@2.11.2-1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-urb1-hv1z-duga In scrapy/scrapy, an issue was identified where the Authorization header is not removed during redirects that only change the scheme (e.g., HTTPS to HTTP) but remain within the same domain. This behavior contravenes the Fetch standard, which mandates the removal of Authorization headers in cross-origin requests when the scheme, host, or port changes. Consequently, when a redirect downgrades from HTTPS to HTTP, the Authorization header may be inadvertently exposed in plaintext, leading to potential sensitive information disclosure to unauthorized actors. The flaw is located in the _build_redirect_request function of the redirect middleware. CVE-2024-1968
GHSA-4qqq-9vqf-3h3f
PYSEC-2024-258

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-03T07:50:53.834069+00:00 Debian Importer Fixing VCID-urb1-hv1z-duga https://security-tracker.debian.org/tracker/data/json 38.1.0