FreeBSD : py-Scrapy -- credentials leak vulnerability (2ad25820-c71a-4e6c-bb99-770c66fe496d)

high Nessus Plugin ID 180368

Language:

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the 2ad25820-c71a-4e6c-bb99-770c66fe496d advisory.

- When the built-in HTTP proxy downloader middleware processes a request with `proxy` metadata, and that `proxy` metadata includes proxy credentials, the built-in HTTP proxy downloader middleware sets the `Proxy-Authentication` header, but only if that header is not already set. There are third-party proxy- rotation downloader middlewares that set different `proxy` metadata every time they process a request.
Because of request retries and redirects, the same request can be processed by downloader middlewares more than once, including both the built-in HTTP proxy downloader middleware and any third-party proxy-rotation downloader middleware. These third-party proxy-rotation downloader middlewares could change the `proxy` metadata of a request to a new value, but fail to remove the `Proxy-Authentication` header from the previous value of the `proxy` metadata, causing the credentials of one proxy to be leaked to a different proxy. If you rotate proxies from different proxy providers, and any of those proxies requires credentials, you are affected, unless you are handling proxy rotation as described under **Workarounds** below. If you use a third-party downloader middleware for proxy rotation, the same applies to that downloader middleware, and installing a patched version of Scrapy may not be enough; patching that downloader middlware may be necessary as well. (2ad25820-c71a-4e6c-bb99-770c66fe496d)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://osv.dev/vulnerability/GHSA-9x8m-2xpf-crp3

http://www.nessus.org/u?08b5ee06

Plugin Details

Severity: High

ID: 180368

File Name: freebsd_pkg_2ad25820c71a4e6cbb99770c66fe496d.nasl

Version: 1.0

Type: local

Published: 8/31/2023

Updated: 8/31/2023

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:py310-scrapy, p-cpe:/a:freebsd:freebsd:py311-scrapy, p-cpe:/a:freebsd:freebsd:py37-scrapy, p-cpe:/a:freebsd:freebsd:py38-scrapy, p-cpe:/a:freebsd:freebsd:py39-scrapy, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 8/31/2023

Vulnerability Publication Date: 7/29/2022