Bug 1222885 (CVE-2024-3572) - VUL-0: CVE-2024-3572: python-Scrapy: Decompression bomb vulnerability
Summary: VUL-0: CVE-2024-3572: python-Scrapy: Decompression bomb vulnerability
Status: RESOLVED FIXED
Alias: CVE-2024-3572
Product: openSUSE Distribution
Classification: openSUSE
Component: Security (show other bugs)
Version: Leap 15.6
Hardware: Other Other
: P5 - None : Normal (vote)
Target Milestone: ---
Assignee: Dirk Mueller
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/401985/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2024-04-16 09:29 UTC by SMASH SMASH
Modified: 2024-04-16 09:32 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-04-16 09:29:49 UTC
The scrapy/scrapy project is vulnerable to XML External Entity (XXE) attacks due to the use of lxml.etree.fromstring for parsing untrusted XML data without proper validation. This vulnerability allows attackers to perform denial of service attacks, access local files, generate network connections, or circumvent firewalls by submitting specially crafted XML data.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-3572
https://www.cve.org/CVERecord?id=CVE-2024-3572
https://github.com/scrapy/scrapy/commit/809bfac4890f75fc73607318a04d2ccba71b3d9f
https://huntr.com/bounties/c4a0fac9-0c5a-4718-9ee4-2d06d58adabb
Comment 1 Robert Frohl 2024-04-16 09:30:27 UTC
already fixed, only missing reference. Closing
Comment 2 Robert Frohl 2024-04-16 09:32:15 UTC
upstream advisory
https://github.com/scrapy/scrapy/security/advisories/GHSA-7j7m-v7m3-jqm7