Bug 1222885 (CVE-2024-3572)

Summary: VUL-0: CVE-2024-3572: python-Scrapy: Decompression bomb vulnerability
Product: [openSUSE] openSUSE Distribution Reporter: SMASH SMASH <smash_bz>
Component: SecurityAssignee: Dirk Mueller <dmueller>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P5 - None CC: rfrohl
Version: Leap 15.6   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/401985/
Whiteboard:
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description SMASH SMASH 2024-04-16 09:29:49 UTC
The scrapy/scrapy project is vulnerable to XML External Entity (XXE) attacks due to the use of lxml.etree.fromstring for parsing untrusted XML data without proper validation. This vulnerability allows attackers to perform denial of service attacks, access local files, generate network connections, or circumvent firewalls by submitting specially crafted XML data.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-3572
https://www.cve.org/CVERecord?id=CVE-2024-3572
https://github.com/scrapy/scrapy/commit/809bfac4890f75fc73607318a04d2ccba71b3d9f
https://huntr.com/bounties/c4a0fac9-0c5a-4718-9ee4-2d06d58adabb
Comment 1 Robert Frohl 2024-04-16 09:30:27 UTC
already fixed, only missing reference. Closing
Comment 2 Robert Frohl 2024-04-16 09:32:15 UTC
upstream advisory
https://github.com/scrapy/scrapy/security/advisories/GHSA-7j7m-v7m3-jqm7